Recent Articles

Hierarchy of IT Security

When thinking about IT Security, the list of management tasks can be overwhelming.  We’ve put together a simple list of protections that should be included in every cybersecurity plan.   Managed IT Services A quality managed service provider will assume responsibility for the security of the

Read More »

The Smart Way to Handle Smart Devices

Smartphones, smart appliances, smart homes … Is there anything that isn’t smart? Well, it turns out that relying on smart devices isn’t always that smart. The Internet of Things, or IoT, is the new frontier in networking. Smart devices have internet capability, enabling them to

Read More »

Your Data is Valuable — Protect It

Thieves coming after your money is easy to understand. But why would someone target your data?  Many people don’t think of protecting data such as their email address, phone number or personal ID number. But these simple pieces of information are often valuable targets for

Read More »

Social Engineering — And All Its Moving Parts

Sometimes, the most powerful tool is a word. Social engineers know that, and they use that tool to bypass all of the automatic protections and preplanned procedures you have in place. A persuasive lie can get an attacker further than a dozen hacking tricks. Fighting

Read More »

The Many Forms of Malware

Malware comes in many forms … and many disguises. Variants include computer viruses, worms, Trojan horses, rootkits and ransomware, but it all comes down to the same thing: malicious software invading your machine. The main purpose of malware is to steal money, data, access and

Read More »

Fishing and Phishing

Fishing is the art of dangling bait to catch a meal. Phishing is the art of dangling bait to catch a person. Phishers will impersonate friends, families, companies or authorities and dangle offers or threats to attract attention. Then, when someone takes that bait, the

Read More »

iSAFE SECURED Program Is Finally Here!

We’ve been talking about this for a couple of years now, and we have finally released the small business certification level of the iSAFE SECURED Program. Over the past few years, as cyber security has become a real and growing concern, we’ve served a variety

Read More »

Top 3 Ways To Recover From A Human-Induced Disaster

Disaster recovery is becoming more and more important to small businesses and each company needs to have disaster recovery solutions in place. Disasters like earthquakes, fire, tsunamis, and tornadoes are quite common in several parts of the world but these are all natural disasters. Unfortunately,

Read More »

Cybersecurity Relative To Small Businesses 

We often read about the security breaches of data in large corporations. In these breaches, personal information of consumers is leaked and makes headlines. But have you ever given thought to the security of Small Businesses against hackers? Although this is a regular occurrence, it doesn’t receive much

Read More »
Have Questions? Schedule a call or meeting with our team to discuss your needs.