JOIN OUR TEAM
Nick Bambulas

Author: Nick Bambulas

Date: 11/25/2019

A Day in the Life of a vCIO

The good news for IT and computer professionals is that by next year there will be 1.4 million jobs available. The bad news is, according to Code.org, colleges will only graduate 400,000 computer science students to...

Topics: Managed IT, Cybersecurity

Patrick Flesch

Author: Patrick Flesch

Date: 11/07/2019

5 Biggest Cyberattacks of 2019 (So Far) and Lessons Learned

Cyberattacks on IoT devices have surged 300% in 2019, due in large part to rapid adoption of IoT in combination with aging firmware and IT architectures. Many of these are unprecedented attacks and include seemingly...

Topics: Managed IT, Cybersecurity

David Eichkorn

Author: David Eichkorn

Date: 10/17/2019

6 Proven Ways to Secure a Computer Network

Computer and network security breaches seem to be in the news every day, and they’re costing the organizations that fall prey millions of dollars. In fact, IBM reports that the average cost per incident rose yet...

Topics: Managed IT, Cybersecurity

Mark Flesch

Author: Mark Flesch

Date: 10/15/2019

Want to Learn How to Secure Print? Here's 3 Ways to Do It

Did you ever wonder how a hacker launches a worldwide attack? Last year, the hacker @HackerGiraffe launched a worldwide printer hack, resulting in crude messages being printed out on thousands of printers worldwide.

Topics: Managed Print, Cybersecurity

David Eichkorn

Author: David Eichkorn

Date: 10/10/2019

How to Evaluate a Managed IT Service Provider in 5 Simple Steps

According to Deloitte’s 2019 Global Cost Technology Survey, companies report their greatest internal threats as maintaining the reliability of their systems, closely followed by the recruitment, development and...

Topics: Managed IT, Cybersecurity

David Eichkorn

Author: David Eichkorn

Date: 08/07/2019

The Growing Cybersecurity Threat for Small Businesses 

Brookside ENT and Hearing Center was a small medical practice in Battle Creek, Michigan until it was hacked and held for ransom by cyber criminals.   

Topics: Cybersecurity

Chera Pupi

Author: Chera Pupi

Date: 05/23/2019

7 Signs of a Phishing Scam — Clues to Look For [VIDEO]

Even with all the latest technology, IoT gadgets and advanced artificial intelligence being leveraged by businesses these days, hackers and cybercriminals continue to rely on old, time-tested methods for stealing...

Topics: Cybersecurity

Chera Pupi

Author: Chera Pupi

Date: 05/09/2019

Navigating the Cybersecurity Maze — The Best Defense Against Hackers

We get it. Trying to understand cybersecurity technology for your business can be scary, confusing and daunting. Too often, cybersecurity service providers act like they can flip a switch and magically fix all your...

Topics: Cybersecurity

 

Cybersecurity Tips For Employees

Need More Information?

We’re ready – and eager – to help you solve your technology challenges.