Resources and Information

Recent Articles

Hierarchy of IT Security Cybersecurity

Computer Hardware Recommendations

Every year about this time we tend to get a lot of requests for computer recommendations.  Those recommendations of course change regularly as technology changes but I will try to keep this post up to date with the latest information about what you should be looking for in a new

Read More »
Hierarchy of IT Security IT Compliance

The Smart Way to Handle Smart Devices

Smartphones, smart appliances, smart homes … Is there anything that isn’t smart? Well, it turns out that relying on smart devices isn’t always that smart. The Internet of Things, or IoT, is the new frontier in networking. Smart devices have internet capability, enabling them to network with computers, phones and

Read More »
Hierarchy of IT Security

Your Data is Valuable — Protect It

Thieves coming after your money is easy to understand. But why would someone target your data?  Many people don’t think of protecting data such as their email address, phone number or personal ID number. But these simple pieces of information are often valuable targets for attackers. All forms of data

Read More »
Hierarchy of IT Security IT Compliance

Social Engineering — And All Its Moving Parts

Sometimes, the most powerful tool is a word. Social engineers know that, and they use that tool to bypass all of the automatic protections and preplanned procedures you have in place. A persuasive lie can get an attacker further than a dozen hacking tricks. Fighting social engineering is all about

Read More »
Hierarchy of IT Security Complete Managed Service

The Many Forms of Malware

Malware comes in many forms … and many disguises. Variants include computer viruses, worms, Trojan horses, rootkits and ransomware, but it all comes down to the same thing: malicious software invading your machine. The main purpose of malware is to steal money, data, access and other valuable things. It may

Read More »
Hierarchy of IT Security Phishing Cybersecurity

Fishing and Phishing

Fishing is the art of dangling bait to catch a meal. Phishing is the art of dangling bait to catch a person. Phishers will impersonate friends, families, companies or authorities and dangle offers or threats to attract attention. Then, when someone takes that bait, the phisher harvests their information or

Read More »
5 Interview Questions to Ask When Hiring IT Managers Complete Managed Service

5 Interview Questions to Ask When Hiring IT Managers

Your business needs help to run your IT systems. Security, backups, connectivity – they need to be managed. So you decide to employ someone, but do you know anything about hiring IT managers? The average IT manager’s salary is $87,849 per year. Roles vary from network administrators to project management. But what

Read More »
Hierarchy of IT Security Cybersecurity

Zoom Updates with 5.0

Zoom announced today that they have reached a key milestone in their 90 day plan to increase security. With increased traffic to their site and more users than ever, Zoom has quickly stepped up to address any concerns its users may have, including security issues. The CEO of Zoom, Eric

Read More »
Hierarchy of IT Security IT Support

Is Zoom Trustworthy?

In light of the current lockdown situation, many people all over the country have been turning to video conferencing platforms to replace face to face communications. The most popular platform right now is called Zoom and there have been a lot of articles published in the last couple of weeks

Read More »

SEARCH ARTICLES

FREE REPORT

Image representing the Managed IT services Buyers guide free download

The Kentucky Business Guide To IT Support Services And Compliance

What You Should Expect To Pay For IT Support For Your Small Business (And How To Get Exactly What You Need Without Unnecessary Extras, Hidden Fees And Bloated Contracts)