Who do you ask when you need to know how long that new hardware should last? Is your software is still leading-edge in your industry? Do you have a “rainy day” fund for IT emergencies? Are you sure that every day you are open for business your computer network will add to your growth and […]
Firewall v. Antivirus Software—A Quick Cybersecurity Review
As a part of the “Let Me Help You” series, I recently talked about the importance of two-factor authentication (2FA) for the security of your network. Cybersecurity is a necessity in today’s technologically advanced world, and it starts with two basics. You need the best firewall and you need the best antivirus software. IT specialists like […]
It’s Time To Start Using Two-Factor Authentication On Your Devices
We hear from our clients how awful two-factor authentication is going to be, and we sympathize. But—every day brings a new story of a major security breach. We have to keep fighting the good fight. Especially if your business allows employee remote access to company data, you need to have this important preventive security in […]
Thieves Can Now Steal Your Identity Using Your Personal Cell Phone Number
Your personal cell phone number can be stolen, and your number ported to another phone and another carrier. And since that personal cell phone number is probably on all your accounts, from social media accounts to financial accounts, then the new owner of your number may be able to access these sites, then change your […]
Cyber Assault: Probably Not If, But When
First question, and I am sincere when I ask: Is your business network secure? Do you know that for sure, or are you thinking that must be the case because nothing has gone wrong for a while? I ask because it’s my business to know if my managed IT service clients are vulnerable to this […]
Security: A Good Time To Continue The Conversation About IT Management
Last week I talked about security as being one of the key reasons to let experts be responsible for your business IT management. After last Friday’s Wanna Cry ransomware attack, I want to revisit that notion. Institutions in over 150 countries were hit, with data files stolen and encrypted until a ransom was paid. In […]