What to Look For in an IT Company

A friend of mine told me a sad story I’ve heard many times before. Their last employer kept using an IT company to fix their problems, even though nothing stayed fixed for very long. Something would break. This company would fix it. And after a while, something would break again. Sometimes it was the thing…

Read More

How to Implement a Successful Security Awareness Program

Security Awareness Training Photo

It’s only been six months since a group of hackers breached Colonial Pipeline’s network and held it hostage. This crippled the energy supply for most of the East Coast until Colonial paid millions of dollars. Hackers also have breached LinkedIn and T-Mobile’s networks. Many other massive companies have been burned. But the attacks aren’t limited…

Read More

How to Recover from a Ransomware Attack

How to Recover From a Ransomware Attack

I have a friend whose business suffered a ransomware attack.  Instead of rewarding the crooks with a big pay day, he told them to shove it.  No ransom paid. No long-term damage done.  How did he recover from a ransomware attack, bruised but not bloodied?  I’ll tell you how.  (Pay attention if you prefer not…

Read More

Technology Options for the Post-Pandemic Workforce

One of our clients recently decided not to reopen its office which has been closed since the pandemic began.    Instead, the company will allow employees to work from home.    They’re not alone. Many businesses are radically changing how and where employees work.   With those changes, businesses face new questions and challenges regarding…

Read More

The Importance of Security Awareness Training

A few years ago, a computer virus crippled the Newark Police Department. It crashed their network, and they couldn’t use computers to fight crime… …for FOUR Days. Imagine if that happened to your business. How much downtime could you survive? Could you survive the outage? How much critical work would stall? How long until customer…

Read More

Critical Questions to Ask When Hiring an IT Firm

A Checklist to Help You Choose the Right IT Firm

All tech firms are NOT created equal.  So when you’re shopping for a firm to manage desktop support, keep your network running 24/7, protect your data from hackers and thieves, and help you plan and budget for technology upgrades… …you have to be prepared.  Here are a few questions to ask when vetting prospective Managed…

Read More

Should I Put My Critical Data In The Cloud?

I know a business owner who refused to store critical data in the cloud — until he discovered the advantages He wanted the data in his building, on physical machines that his employees and contractors can touch. He thinks his data is more secure that way.  We understood his concern, but we helped him understand:…

Read More

How to Keep Your Network Secure When Employees Work from Home

When the pandemic hit, a business owner I know scrambled to get his employees up and running at home as quickly as possible.  Fire up those computers. Connect to the business-critical software. Get to work. Keep the business running.  We all have to keep our businesses running… …but working from home creates unique security challenges…

Read More

How to Prevent Phishing and Other Scams During the Pandemic

How to Prevent Phishing and Other Scams

Crises always bring out the crooks. This pandemic is no exception. As we search online for critical information, scammers lurk around every corner, waiting to steal our personal information or install malware on our computers and phones. How do you prevent phishing and other scams? Here are a few tips to keep the scammers at bay:…

Read More