Old technology, backup issues, millions of cables…. The list goes on and on of all the common IT problems businesses face. And often, owners don’t have time to deal with them. They just need the problem quickly fixed so work can continue. For small businesses who...
IT security
Windows 7 End of Life is January 14th, 2020
On January 14, 2020, Windows 7 will reach end-of-life (EOL) and will no longer be supported by Microsoft. If you haven’t started mapping out your migration to Windows 10, it’s time to act. Once a product reaches its end-of-life, no new features or fixes are released...
The Zero Trust Model for SMB IT Security
Protecting your business from cyberattacks is something to take seriously—especially for small businesses. With the speed of their growth and their often-limited budgets, small companies often have to prioritize items and sometimes, having a strong cybersecurity...
The Dark Web: What is it and why should you care?
When you hear about the Dark Web, you may think the very idea is based on fiction, innuendo and fear-mongering. After all, how could it be so bad? It's as though the boogeyman joined forces with the worst cyber stalker and decided to let loose their evil machinations...
Learn How to Prevent Phishing by Spotting It [An Infographic]
It's time to get serious about thwarting phishing attempts. While these attacks are increasing in frequency, we can decrease their success rate with just an ounce of prevention. It doesn't matter how new the approach is, the trick is the same. It's all about...
October is National Cybersecurity Awareness Month
[vc_row][vc_column][vc_column_text] October is National Cybersecurity Awareness Month (NCSAM). NCSAM is a collaborative effort between DHS and its public and private partners - including the National Cyber Security Alliance (NCSA) - to raise awareness about the vital...
What the Three Little Pigs Can Teach Us about Cybersecurity
[vc_row][vc_column][vc_column_text]Last night, as I was putting my kids to bed, I read them the classic children’s story, “The Three Little Pigs”. And you know what it got me thinking about—cybersecurity. Probably everyone in the audience is familiar with the tale,...
Ohio Data Protection Act Just Passed. What Does It Mean for You?
[vc_row][vc_column][vc_column_text] Ohio legislatures just passed the Ohio Data Protection Act, which gives companies a safe harbor in the case of a data breach. Companies that adhere to the NIST Cybersecurity Framework will be entitled to an affirmative defense to...
Is BYOD a Threat to Your I.T. Security?
[vc_row][vc_column][vc_column_text]Bring Your Own Device (BYOD) is jokingly referred to in some IT circles as “Bring Your Own Disaster”. While it offers a great opportunity to reduce costs and make employees happy, it’s still crucial to protect your organization’s...
Holiday Travel Tip for Workers on the Go: Protect Your Data
[vc_row][vc_column][vc_column_text] Whether you're traveling for business or pleasure, it's likely you're logging in for work while on the move. Whether it's on your smartphone or laptop, you need to be extra cautious with your internet access during the holidays....