Blog

Are You Ready for Microsoft Products Reaching EOS in 2020?

Are You Ready for Microsoft Products Reaching EOS in 2020? As 2018 comes to an end, there are several Microsoft products you should consider upgrading to avoid support gaps in 2020, including Windows Server 2008, Windows SBS 2011, SQL Server 2008, Exchange 2010 and Windows 7. Simply put, Microsoft will stop sending security updates for these products after January 14, 2020. In other words, if you’re still using these products after their end of support date, your data will no longer be protected from new threats. With data breaches on [...]

By |2019-05-21T15:17:17+00:00December 12th, 2018|Blog, Windows EOS|Comments Off on Are You Ready for Microsoft Products Reaching EOS in 2020?

How to protect your customers and your business data

If you’re a small business owner, you might think you’re safe from ransomware attacks and hackers. Unfortunately, many of these hackers specifically target smaller retailers, precisely because they assume these companies don’t have proper security in place. According to the Ponemon Institute's 2017 State of Cybersecurity in Small & Medium-Sized Businesses report, the percentage of small businesses that have experienced a cyber-attack in the past 12 months is up from 55% in 2016 to 61% in 2017. Another study saw a 20.5% increase in attempted cyber-attacks between November and December [...]

By |2018-11-27T20:35:35+00:00November 27th, 2018|Blog|Comments Off on How to protect your customers and your business data

How to protect your identity while online shopping

As the holidays quickly approach, most likely you’re planning on doing a lot of online shopping. You aren’t alone - last year 85 percent of U.S. consumers planned to shop online for holiday gifts, according to a Nielsen survey. It couldn’t be easier to get everything you need for the holidays while sitting on the couch - including a stolen identity. While this might sound dramatic, it is entirely possible if you don’t follow best practices when shopping online. In 2016, the FBI’s Internet Crime Complaint Center received nearly 300,000 [...]

By |2018-11-27T20:34:55+00:00November 15th, 2018|Blog|Comments Off on How to protect your identity while online shopping

Who’s watching your network Part 6 – How to optimize your network

While you’re nearing year end, who’s watching your network? Just because things might slow down, doesn’t mean you’re free from security breaches, system errors, and more. Read our six-part series to learn how you can ensure your data is safe while you and your employees take time off from your business. If your business slows down during the year end and holiday season, it can feel stressful. Its a great time to take advantage of possible Section 179 tax savings, take advantage of this time to upgrade and optimize your [...]

By |2018-10-31T18:10:46+00:00October 31st, 2018|Blog|Comments Off on Who’s watching your network Part 6 – How to optimize your network

Who’s watching your network Part 5 – Keeping Data Systems Running

While you’re enjoying a fall break, who’s watching your network? Just because you’re on vacation, doesn’t mean you’re free from security breaches, system errors, and more. Read our six-part series to learn how you can ensure your data is safe while you and your employees take time off from your business. As seasonal weather changes, you’re likely to be more focused on your next beach day than the state of your data. Unfortunately, summer is when data centers and networks are most at risk. History shows that June to August [...]

By |2018-10-31T18:10:56+00:00October 18th, 2018|Blog|Comments Off on Who’s watching your network Part 5 – Keeping Data Systems Running

Who’s Watching Your Network Part 4 – Unified Collaboration

While you’re enjoying summer break, who’s watching your network? Just because you’re on vacation, doesn’t mean you’re free from security breaches, system errors, and more. Read our five-part series to learn how you can ensure your data is safe while you and your employees take time off from your business. Over time, businesses have slowly added more and more communication tools to their arsenal. What started as in-person talks, turned to phone conversations, email, and now many other options including video chat and communicating within the same cloud-based document. [...]

By |2018-10-03T20:05:49+00:00October 3rd, 2018|Blog|Comments Off on Who’s Watching Your Network Part 4 – Unified Collaboration

Who’s watching your network Part 3 – Data Backup & Business Continuity

While you were enjoying summer break, who was watching your network? Just because you’re on vacation, doesn’t mean you’re free from security breaches, system errors, and more. Read our six-part series to learn how you can ensure your data is safe while you and your employees take time off from your business. Does your business have proper data backup policies in place? Infrequent tape backups and other traditional methods are no longer secure enough to keep your system protected. Secure copies of your important business data act as your last [...]

By |2018-09-19T18:30:02+00:00September 5th, 2018|Blog|Comments Off on Who’s watching your network Part 3 – Data Backup & Business Continuity

Who’s watching your network Part 2 – Managed Security

While you’re enjoying summer break, who’s watching your network? Just because you’re on vacation, doesn’t mean you’re free from security breaches, system errors, and more. Read our six-part series to learn how you can ensure your data is safe while you and your employees take time off from your business. The number of cyber threats and attacks is growing, and as a result, it is crucial that businesses prioritize IT security. It’s time to stop living in denial about an attack and start taking proactive measures with managed security services. As a [...]

By |2018-09-04T12:51:17+00:00August 27th, 2018|Blog|Comments Off on Who’s watching your network Part 2 – Managed Security

Who’s Watching Your Network Part 1 – Managed IT

While you’re enjoying summer break, who’s watching your network? Just because you’re on vacation, doesn’t mean you’re free from security breaches, system errors, and more. Read our six-part series to learn how you can ensure your data is safe while you take time off from your business. If an emergency occurs with your system, who is looking after it? The web is a 24/7/365 network, and you need eyes on your network at all times. A managed IT contract can ensure you have a team of dedicated tech experts serving [...]

By |2018-08-04T12:00:30+00:00July 17th, 2018|Blog|Comments Off on Who’s Watching Your Network Part 1 – Managed IT

How To Protect Yourself From a Future Email Attack

This is Part 3 in our series on email hacking Whether you’ve been hacked or not, everyone can take stronger efforts to protect their accounts. In the modern age, it’s no longer if you get hacked – it’s when. There are measures you can take, however to make it more difficult for hackers to gain control of your accounts. Follow these steps to keep your data and identity safe online. Use Secure Passwords Change your passwords on all accounts frequently, and they need to be strong, with at least 12 [...]

By |2018-06-26T18:23:34+00:00June 26th, 2018|Blog|Comments Off on How To Protect Yourself From a Future Email Attack