Category Archives: Uncategorized

How to Know if Your IT Provider Is Doing What They Need to Be Doing

It’s hard to know whether your IT team is managing everything they should be. You’re not technical, so how would you know what’s happening behind the scenes? This quick “review” will help you identify whether your IT Provider is staying on top of the technology at your organization. 1. Our backup system has an onsite […]

On Premise Exchange Is Dead

Grave stone with RIP written on it for Premise exchange

Shocking news rocked the IT world today when it was revealed that Microsoft has successfully quashed on premise Exchange email for small businesses.  They haven’t stopped making or selling Exchange.  You can still buy a current version and it’s even still supported.  Microsoft has just made it prohibitively expensive vs the simpler, cheaper, easier to […]

Cyber Security Insurance

Cyber insurance hologram with locks surrounding it

We’ve had a lot of conversations with clients recently that were trying to get covered with Cyber Security Insurance for the first time or going through a renewal.  Claims paid out by cyber insurance companies have gone up significantly in the last few years because of ransomware, phishing, and other threats.  Insurance companies are getting […]

The Moving Target of Network Security

Man with bow and arrow shooting at ballon with target

Technology is supposed to make things simpler.  Changing IT solutions and a terrifying threat landscape have created a rush of new products and services.  The complexity of Network security has increased 10-fold over the past few years.  IT professionals are hurrying to keep up, understand what’s relevant and implement needed solutions with the moving target […]

Ransomware and Social Engineering Still Top Threats According to Verizon Data Breach Investigation Report

Ransomware and Social Engineering

Since back in 2008 Verizon has been putting out a report each year called the Data Breach Investigation Report (DBIR).  In 2013 they first wrote about ransomware.  Social engineering was already happening and growing in popularity with bad actors.  The latest edition of DBIR shows that 9 years later Ransomware and Social Engineering are still […]

Retired FBI Agent Cybercrimes Division Talks Cyber Security

FBI Cyber Security

I recently attended an IT industry conference where the topics were understandably cyber security heavy.  One of the speakers that stuck out to me was Scott Augenbaum.  Scott is a retired FBI agent that worked in the cybercrimes division for the last 20 years and has recently retired.  A few things from his address stuck […]

Reducing Human Error

Reducing Human Error

As the saying goes, you’re only as strong as your weakest link, and in the case of cybersecurity, your weakest link is humans.  With the new security challenges brought about by remote work, humans have become more of a cyber risk than ever. As of 2022, 88% of data breaches are caused by human error. […]

Threat Report – Emotet 2.0

EMOTET attack

For several years bad actors have been using Emotet malware and its variants in large scale phishing attacks.  These attacks are meant to compromise business email accounts and then allow them to deliver a payload of ransomware.  Some recent updates from Microsoft have made those attacks less effective, so the hackers have had to pivot. […]

Cyber Security Training

Man pointing at chalk board with word, security written on it

The weakest link in most IT security plans is frequently your employees.  Cyber security training can help them recognize threats and not fall for that phishing scam.  Without it, a misguided click can subvert a lot of the other security you’ve worked hard to put in place. What is Cyber Security Training? People make mistakes.  […]