Blog

Ransomware Threats: What SMBs Need to Know

Imagine this: You've worked endlessly over the past month to make a video collage of your parents' treasured memories together for their golden anniversary. You've included the correct pictures, overlaid it with music to make nostalgic recollections of their favorite songs and imparted flawlessness.

Crack the Holiday Cybersecurity Code

The holiday shopping season is one of the most high-risk times for cyber attacks -- not only on consumers but on retailers and associated businesses as well. Since many businesses put their products and services on sale to entice consumers -- who are already in the mood to shop -- threat actors are also shopping for easy and lucrative targets.

Top 10 Web Application Threats

To be forewarned is to be forearmed. The more that you know about the potential cybersecurity threats that every internet user faces, the better prepared you will be to combat them. In the area of web application security, nobody does it better than the Open Web Application Security Project (OWASP). The OWASP Foundation may be best known for its OWASP Top Ten list, a collection of web application vulnerabilities that it updates every few years.

The Untapped Goldmine of Cybersecurity Lessons We Learned in the 2010s

It's almost difficult to believe the end of the 2010s will be upon us in just a few short  months. Seems like a good time to review what we've seen and learned over the past decade. Certainly, much has changed over the years. The cybercrime world has continued to breach our systems with even more voracity and sophistication than previously experienced.

The Pros and Cons of VoIP Phones

Voice over IP (VoIP) phones have been around for a while now, but with so many maturing technologies now in place, we may see significant growth in VoIP usage in the near future. According to Market Watch, “Voice over Internet Protocol (VoIP) market is projected to surpass USD 55 billion by 2025.” Just like the traditional phone created by Alexander Graham Bell, the main purpose of a VoIP phone is to carry a voice conversation.

Benefits of Managed IT Services

When he was a boy growing up in the 90s, Danny’s dad ran a small consulting business in town.  The firm had about 18 employees working in the office, all of them connected to the same computer system.  Dial-up internet was considered a luxury, and one Danny’s father did not provide his firm.

Is Your Disaster Recovery Plan in Place?

Prepare for the worst and hope for the best. It’s good advice, especially for small businesses trying to keep all facets of their IT infrastructure running like clockwork. But all too often companies keep going on a hope and a prayer without making provisions for potential disasters.

6 Cybersecurity Trends You Can’t Afford to Miss

The tech industry is quite dynamic and constantly changing. It goes without saying that cybersecurity tools, and strategies, is constantly evolving as well. Especially with the advent of AI, and 5G, many business decision makers expect huge impacts from these technologies.

Preparing for Cloud Migration

If you haven’t moved to the cloud yet, you’re behind the curve. According to the 2019 RightScale State of the Cloud Report from Flexera, 94% of their respondents are already using the cloud. And 69% of respondents use at least one public cloud and one private cloud.