HELPFUL RESOURCES AND INFORMATION

Recent Articles

Hierarchy of IT Security

When thinking about IT Security, the list of management tasks can be overwhelming.  We’ve put together a simple list of protections that should be included in every cybersecurity plan.   Managed IT Services A quality managed service provider will assume responsibility for the security of the

Read More »

Computer Hardware Recommendations

Every year about this time we tend to get a lot of requests for computer recommendations.  Those recommendations of course change regularly as technology changes but I will try to keep this post up to date with the latest information about what you should be

Read More »

The Smart Way to Handle Smart Devices

Smartphones, smart appliances, smart homes … Is there anything that isn’t smart? Well, it turns out that relying on smart devices isn’t always that smart. The Internet of Things, or IoT, is the new frontier in networking. Smart devices have internet capability, enabling them to

Read More »

Your Data is Valuable — Protect It

Thieves coming after your money is easy to understand. But why would someone target your data?  Many people don’t think of protecting data such as their email address, phone number or personal ID number. But these simple pieces of information are often valuable targets for

Read More »

Social Engineering — And All Its Moving Parts

Sometimes, the most powerful tool is a word. Social engineers know that, and they use that tool to bypass all of the automatic protections and preplanned procedures you have in place. A persuasive lie can get an attacker further than a dozen hacking tricks. Fighting

Read More »

The Many Forms of Malware

Malware comes in many forms … and many disguises. Variants include computer viruses, worms, Trojan horses, rootkits and ransomware, but it all comes down to the same thing: malicious software invading your machine. The main purpose of malware is to steal money, data, access and

Read More »

Fishing and Phishing

Fishing is the art of dangling bait to catch a meal. Phishing is the art of dangling bait to catch a person. Phishers will impersonate friends, families, companies or authorities and dangle offers or threats to attract attention. Then, when someone takes that bait, the

Read More »

Home Office Printing and Scanning

In this article I’m going to give you a few printing and scanning options that I think are the best solution to the issue at hand.  I should also include in this article for those who may be reading it years from now that this

Read More »

Work From Home Survival Guide

In this article I want to give you a few resources that we recommend to allow you and your team to work efficiently from home, and how you can prepare yourself for the future if we are ever faced with something like this again.  If

Read More »

Bluegrass Community Foundation Receives Security Award

The Bluegrass Community Foundation in Lexington Kentucky becomes the first recipient of the iSAFE SECURED certificate and seal on Wednesday after having achieved 100% compliance with the program requirements (Click Here to View Them). The Bluegrass Community Foundation offers people a convenient, simple way to

Read More »
Have Questions? Schedule a call or meeting with our team to discuss your needs.