The Tek > Blogs
X

Blogs

For "Small & Medium-sized Business (SMBs)". - "A fairly inexperienced hacker can attack a large number of SMBs with little risk, higher payment return, less law enforcement interference, and almost no chance of retaliation. Why? Because SMBs are not prepared and in many cases apathetic. It will never happen to me—that’s something that happens to the other guy."
Read More
By By Rick Miller - In the history of our democracy, we have never had a more open, free, and unregulated system of information and communication than the internet. The industrial revolution pales in comparison to the global impact of technology on an unexpecting world. Like all world-changing advances, the internet and all its associated technology has created astonishing benefits and unmatched threats.
Read More
The most interesting statistic to come out of the cyber security market in the last couple of years is also one of the most overlooked. This statistic points to one of the most obvious problems facing cyber security experts today. It is also one of the most affordable and easiest problems to fix. So what is this statistic? It involves your people and an activity they do at work every day. Read more lo learn: 10 ways to avoid phishing scams
Read More
As a cybersecurity professional, you are the guardian of data, the gate keeper, and the architect of defense. You live on the front lines of a digital battle against invisible enemies and advanced persistent threats. 
Read More
The cybersecurity landscape changes every day, with new actors, new threats, new schemes, and new ways to infiltrate websites, emails, devices, and almost anything that is connected to the internet. We’re constantly reading about the rise of spear phishing, DDoS attacks, global malware threats, ransomware, CEO fraud, and more.
Read More
You just clicked on a link that contained malware. Your computer screen turns red. You are the victim of a Ransomware attack. All of your data has been locked down. You can’t access any of your systems. Your company is completely shut down. You need to restore your data and get your company back up and running. Every minute means lost revenue and production. Fortunately, you have a back-up plan. Your back-ups are valid, you restore your data and you are back on-line.
Read More
Did you know that 140,000 disk drives crash per week in the U.S.?  That’s a lot of lost data! Are you prepared for a data loss incident? Are malware and ransomware a concern to you? Do you have a backup strategy in place? Is your backup strategy reliable enough to get you back up and running in a critical situation? ......
Read More
As you head into the office, you’re not thinking about backing up the data on your computer. Instead, your focus is on navigating rush hour traffic and listening to the news. But then you hear that the area rivers are starting to overflow their banks. You think about it for a moment; and hope everyone is ok. Until... ....
Read More
We had a client that needed a conference room TV that was fast and portable. This was our solution.
Read More
“The next Pearl Harbor will be Cyber! It’s a cheap way to attack! No bombers or submarines needed. We must do much more to protect our infrastructure from attack. ” - Senator Angus King, Maine. The idea that we must protect our businesses from a dark nefarious shadowy threat that lurks beneath the surface of the Internet paints a scary picture of the threat we all face. ......
Read More
Page 2 of 5 First 1[2]345 Last
Sign up for our Newsletter
Name