Resources and Information

Recent Articles

Hierarchy of IT Security Complete Managed Service

The Many Forms of Malware

Malware comes in many forms … and many disguises. Variants include computer viruses, worms, Trojan horses, rootkits and ransomware, but it all comes down to the same thing: malicious software invading your machine. The main purpose of malware is to steal money, data, access and other valuable things. It may

Read More »
Hierarchy of IT Security Phishing Cybersecurity

Fishing and Phishing

Fishing is the art of dangling bait to catch a meal. Phishing is the art of dangling bait to catch a person. Phishers will impersonate friends, families, companies or authorities and dangle offers or threats to attract attention. Then, when someone takes that bait, the phisher harvests their information or

Read More »
Hierarchy of IT Security Gold Badge IT Support

iSAFE SECURED Program Is Finally Here!

We’ve been talking about this for a couple of years now, and we have finally released the small business certification level of the iSAFE SECURED Program. Over the past few years, as cyber security has become a real and growing concern, we’ve served a variety of customers with many different

Read More »
Top 3 Ways To Recover From A Human-Induced Disaster IT Support

Top 3 Ways To Recover From A Human-Induced Disaster

Disaster recovery is becoming more and more important to small businesses and each company needs to have disaster recovery solutions in place. Disasters like earthquakes, fire, tsunamis, and tornadoes are quite common in several parts of the world but these are all natural disasters. Unfortunately, sometimes business have to deal

Read More »

Cybersecurity Relative To Small Businesses 

We often read about the security breaches of data in large corporations. In these breaches, personal information of consumers is leaked and makes headlines. But have you ever given thought to the security of Small Businesses against hackers? Although this is a regular occurrence, it doesn’t receive much media attention. In fact, many entrepreneurs are

Read More »

Impact of Increasing Data Breaches

Impact of increasing data breaches by large companies Last Wednesday, Amazon revealed that the personal information of some of its customers was compromised, with names and email addresses being disclosed due to what was deemed a technical error. This is the latest in a long line of breaches that have

Read More »

Healthcare in the Hot Seat

In case you were wondering if HIPAA violations are really enforced, I thought I would bring a few big money settlements to your attention.  If you’re not in the healthcare industry, you might be wondering what HIPAA even is.  HIPAA stands for the “Health Insurance Portability and Accountability Act” which

Read More »

Are you a “Sitting Duck”?

Small businesses are under attack. Right now, extremely dangerous and well-funded cybercrime rings in China, Russia and the Ukraine are using sophisticated software systems to hack into thousands of small businesses to steal credit cards and client information, and swindle money directly out of your bank account. Some are even

Read More »

Dangerous Assumptions about Bank Security

Here’s a shocker to most business owners: Your bank often can NOT reclaim money stolen from your bank account due to fraud or cyber-crime. That means if money gets drafted from your business bank account from a hacker, phishing attack, identity theft or by any other means, you have little

Read More »

SEARCH ARTICLES

FREE REPORT

Image representing the Managed IT services Buyers guide free download

The Kentucky Business Guide To IT Support Services And Compliance

What You Should Expect To Pay For IT Support For Your Small Business (And How To Get Exactly What You Need Without Unnecessary Extras, Hidden Fees And Bloated Contracts)