News & Media

5 Reasons on why NOT to upgrade to Windows 11 – YET

1. Your computer may not be compatible – new computers going forward will have Windows 11, but many machines currently out there will not support this upgrade 2. Your business software may not work with Windows 11 – we have already received many communications that business software such as Sage is not compatible with Windows…

Read More...

The Week in Breach: Cybersecurity Awareness Month – MUCH NEEDED spotlight

Make sure to add us or contact us for the latest news Real-Time Service Alerts Cybersecurity Awareness Month is Upon Us and Not a Moment Too Soon There is a sharp uptick in the cyberthreats we have been seeing this past week; most especially the ongoing DDOS attack against VOIP Providers October is the month…

Read More...

The World Has Stopped Listening…Perhaps

Ransomware. Hacks. PII leaks. Data Breaches. DDOS Attacks. Smishing. Phising. All of it. It has become noise I’m afraid. Since Saturday, a major DDOS attack has ravaged Voice Over Internet Protocol (VOIP) providers with an extended, targeted DDOS* attack that has crippled many business phone systems (including the ability to call 911). As a Managed…

Read More...

The Week in Breach: It’s Gonna Be a Bad Week for Some – EPIK Hack by Anonymous

Make sure to add us or contact us for the latest news Real-Time Service Alerts Anonymous Leaks Gigabytes of Data from Host EPIK About 15 million names, phone numbers, email addresses, and physical addresses held by the platform, Epik, were revealed. In what will undoubtedly be a much talked about, hot topic breach – Anonymous…

Read More...

Carlos Juan Carlos – Fame, Fortune, IT.

Ransomware protection so powerful they’ll be asking for your autograph. Ask us for more info

Read More...

The Week in Breach: The One In Where We Argue that You NEED 2FA – Again

Make sure to add us or contact us for the latest news Real-Time Service Alerts 2FA is Becoming a Requirement – Not a Suggestion Your IT team wasn’t ‘crying wolf’ – they were more like the canary in the coal mine. In this week’s featured briefing – we touch on the critical nature of having…

Read More...

The Questions You Need to Ask Your Next MSP Provider

  Finding and vetting a new IT Managed Service Provider (MSP) can be a daunting task for small businesses. In the not so distant past, the kinds of questions that businesses needed to ask of their IT providers ran to ‘can you fix my computers?’, ‘will you support my server?’, ‘do you take support calls?’,…

Read More...

Why 2FA is Becoming a Requirement

Our CEO speaks to our article about 2FA requirements (found here). Security is at the forefront of ‘all things IT’ for the foreseeable future. Multi-factor authentication is an easy way to thwart would-be ‘bad actors’. Here is what Dan Gilligan has to say about it.

Read More...

The Week in Breach: Windows zero-day MSHTML attack – how not to get booby trapped!

Make sure to add us or contact us for the latest news Real-Time Service Alerts Windows zero-day MSHTML attack – how not to get booby trapped! “This can be mitigated really easily with user training,” Kelly Yeh, president of Chantilly, Va.-based Microsoft partner Phalanx Technology Group, tells CRN. “We call it layer eight problems —…

Read More...

The Anvil 9000: The phone that weighs less than most pianos

Phones have evolved – shouldn’t your cybersecurity? Sophos defeats threats with cybersecurity that is evolved. Learn more: Contact Us

Read More...

The Week in Breach: Why a Strong Security Culture is the Magic Bullet You’re Looking For

Make sure to add us or contact us for the latest news Real-Time Service Alerts Why a Strong Security Culture is the Magic Bullet You’re Looking For (and 3 Ways to Help You Build It) The importance of building a strong security culture is something that is always considered a best practice for building a…

Read More...

2FA is Becoming a Requirement – Not a Suggestion

As more and more cyber incidents hit the news and consequently hit businesses small to large – the more insistent IT professionals become about shoring up cyber security holes. One of the easier (and very effective) holes to plug is Two Factor Authentication or 2FA. We have become broken records over the last few years…

Read More...
Scroll to Top