<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

Education Center

Articles, Training, Videos, Tips, eBooks, and More!

IT Untangled: 1 in 5 Businesses Are Affected By Cybercrime, Are You Next?

One in five small businesses are affected by cybercrime each year. – The National Cyber Security Alliance.

Let that sink in. One in five. That is some serious risk. While companies like Target and Sony have the financial support to get them through this kind of scandal, do you?

Read More

Tech Alert: Cyber Attacks On The Rise

Hackers were real show-stoppers in 2016. Globally, data breaches and technology disruptions were sweeping everyone.

Today, cyber attackers use things outside of the normal social media and websites to hack you. They’re using things like artificial intelligence and smart infrastructure or devices. The Internet of Things (IoT), although amazing for advancements, also leaves us very vulnerable.

Read More

IT Untangled: Does Your Work Phone Need Antivirus?

Does your smartphone have a virus? Would you know how to determine if it did? There are security vulnerabilities on your phone just like on your desktop or laptop. These vulnerabilities are likely to double if you use your work smartphone for sensitive information. Think email accounts, transactions, or accounts receivable. If any or all of that is linked to your phone without the proper security precautions, you might as well post your bank account number and pin on Facebook.

Read More

What To Do When Your Email Has Been Hacked

A colleague got an odd email from you, but you didn’t send it. … How did this happen? Were you hacked?

With the right IT security measures in place, successful attacks on corporate email systems are rare, but they do happen.

So what should you do when you think you’ve been hacked?

Read More
Topics: I.T. Security

Could One Tiny Leak Wipe Out Your Entire Company?

Things were going great at Michael Daugherty’s up-and-coming $4 million medical-testing company.


He was a happy man. He ran a good business in a nice place. His Atlanta-based LabMD had about 30 employees and tested blood, urine and tissue samples for urologists. Life was good for this middle-aged businessman from Detroit.

Then, one Tuesday afternoon in May 2008, the phone call came that changed his life. His general manager came in to tell Daugherty about a call he’d just fielded from a man claiming to have nabbed a file full of LabMD patient documents. For a medical business that had to comply with strict federal rules on privacy, this was bad. Very bad.

Read More
Topics: I.T. Security

Go Mobile - Without Killing Your Data

What if you could tap into the top talent in your industry, no matter where in the world they are? With the power of the mobile web, your all-star team is now – literally – at your fingertips.

Read More
Topics: I.T. Security

5 Ways To Spot A Social Engineering Attack

“I’m not going to make payroll – we’re going to close our doors as a result of the fraud.”

Unfortunately, that statement is becoming more common among smaller businesses, according to Mitchell Thompson, head of an FBI financial cybercrimes task force in New York.

The FBI reports that since October 2013 more than 12,000 businesses worldwide have been targeted by social engineering–type cyberscams, netting criminals well over $2 billion. And those are just the reported cases. Often, due to customer relationships, PR or other concerns, incidents go unreported.

These unfortunate events were triggered by a particularly nasty form of cyberattack known as “social engineering.”

Read More
Topics: I.T. Security

Shadow IT: Ignore At Your Own Risk

It’s one of those little secrets that nobody wants to talk about…

The term “Shadow IT” refers to apps and devices used at work that operate outside your company’s sanctioned policies and protocols.

Shadow IT takes many forms, like conversations on Facebook Messenger, Google Hangouts, Gmail or Skype. It can include software from Excel macros to cloud-based data storage apps such as Dropbox, Google Docs and Evernote. Or collaboration spaces like Slack, Asana and Wrike. And then there are devices: USB sticks, smartphones, tablets and laptops within your network that you have no control over.

Robert J. Moore, CEO of RJMetrics, relates how companies like Slack and Dropbox craft their pricing models to encourage rapid proliferation. One day, a few of his engineers were using Slack, then all the engineers, then the whole rest of the company was using it. He said, “We reached a point of no return and paying for it was pretty much our only option.”

Read More
Topics: I.T. Security

Social Engineering & IT Security: What Businesses Need To Know

Keyboard_hacker.jpg

Every day we’re presented with news of the “next big thing.” Disruptive technology developed by some of the most resourceful minds of our time has created tremendous value for companies. These revolutionary tools, which have completely changed the ways we work and play, are simply powerful.

The problem is that power isn’t always a good thing. In 1771, British-Irish statesman Edmund Burke said, “The greater the power, the more dangerous the abuse.” While his subject at the time had more to do with politics than technology, the statement holds the same truth today as it did then.

There are few places where power is abused more dangerously than in the cybercrime industry. According to “Net Losses: Estimating the Global Cost of Cybercrime,” a report published by McAfee, the cost to the global economy could be as high as $575 billion a year.

How should your business enlist in the global fight against cybercrime? As always, it is important to ensure you’re using the right combination of hardware and software to keep illicit software (malware) from being transmitted to your company’s network – but there is a new threat, and that threat is you.

Read More
Topics: I.T. Security

10 Things You Must Do Now To Prevent A Costly Data Disaster

In less than 60 seconds, you are about to learn 10 things that could save you days – or even weeks – of downtime, not to mention the undue stress on your company, and potentially thousands of dollars lost, due to a data disaster…

Use this article as your checklist in a conversation with your IT company to assure that your business has the right plan in place to get back up and running quickly if and when disaster strikes.

Read More