5 Ways to Secure Remote Workers & Keep Your Data Safe
Cybersecurity: On-site and Remote Cyberattacks can't stop us from developing new technology solutions. As a result of the pandemic, 2020 increased the demand for ways to secure remote workers, devices, and networks. The numbers aren't in yet, but some reports are...
Social Engineering Techniques: How Hackers Come Home
WELCOME HOME, MALWARE TIME TO MAKE YOURSELF AT HOME Human manipulation fuels social engineering techniques, and basic security measures, like anti-virus software, often can’t prevent innocent behaviors, like trust, from compromising your data. Hackers...
EternalBlue Hacks & Tales from the Unpatched (Video)
EternalBlue, which is an ancient set of hacks — ancient: going back three years — is still applicable, especially in regard to some of the technology and vulnerabilities that we are seeing today. EternalBlue is a software that the NSA developed to hack Windows...
In-House, Web-Based or Private Cloud Solutions
If only purchasing software for business enablement could be as simple as tapping a button in an app — click once for on-premise installation, twice for web-based deployment, thrice for private cloud solutions. When considering software, users normally think about...
Dark Web Protection: Assessment, Awareness & Actualization
Business owners, especially those who have been through the challenges involved in a data breach, often hope the dark web goes completely dark — as in nonexistent. Wouldn't it be nice if trending IT services, like advanced web scans and security audits, go out with...
Getting QWERTY with Password Management
Common Password Management Security Mistakes qwerty, password, 12345, iloveyou, 111111, 54321 An average individual comes into daily contact with a variety of personal apps, websites, remote connections and enterprise applications. And this concoction of connections...
IT Services in a 1 + 1: 4 Signs You Need Managed IT
The word “outsourced” makes some business owners curious and others nervous when it comes to IT services. “MSP” is another term floating around, and you might also come across “IT-in-a-Box” when you go looking for help with your systems. Managed IT (our favorite code...
Mobile Device Theft Prevention Tips
Cell Phone Theft Prevention: Digital Assets vs. Liabilities With more people working outside of the office, companies need to prepare their employees for the possibility that company and personal mobile devices could be lost to theft or misplacement. Remotely...
Hidden Ransomware as a VM Valentine (Video)
Apparently ransomware is now installing a virtual machine inside the hacked computer in order to avoid detection. We’ve entered a new phase of devious behavior! How will your company avoid the new forms of ransomware hidden in your system's shadows?Hackers Exploit...
IT Strategies for Remote Teams (Video)
Brad Feakes SVP Epicor Services, Professional Services Daryl Sirota Technical Services Director Brad and Daryl talk about IT strategies for remote teams Brad and Daryl sit down this week for a Q&A style chat to unravel a few of the complex IT issues in...