Mark Flesch

Author: Mark Flesch

Date: 10/04/2018

The Dangers of Unauthorized File Sharing, and Tips for Business

Does your business have a handle on all the ways employees share information across departments and with others outside your organization?

In an effort to improve productivity and efficiencies, employees often use...

Topics: Cybersecurity

Kirk Hoeppel

Author: Kirk Hoeppel

Date: 09/20/2018

What is the Dark Web and Why Should My Business Care?

There’s a lesser-known “dark side” of the internet, known as the Dark Web — a place where most cybercrime and other criminal activities originate. Users of the Dark Web encrypt their online activities to remain...

Topics: Managed IT, Cybersecurity

Eric Kindschi

Author: Eric Kindschi

Date: 09/13/2018

Malicious PDFs: How This New Cyberattack Could Steal Your Company’s Emails

Imagine finding out that someone in your office was quietly monitoring all your incoming and outgoing business communications. That person then copied every message you sent and emailed all the information to a...

Topics: Cybersecurity

Mike Adams

Author: Mike Adams

Date: 08/16/2018

This Week in Cybersecurity: Finding Security in an Insecure Age

Imagine you get a call from the FBI or other law enforcement agency. An agent tells you an investigation has uncovered evidence that your network has been breached and customer data was stolen. After a little...

Topics: Managed IT, Cybersecurity

Mark Flesch

Author: Mark Flesch

Date: 05/31/2018

6 Ways Employees Pose Your Greatest Cybersecurity Risk

Based on 53,000 security incidents from 67 organizations around the world, Verizon’s most recent Data Breach Investigations Report (DBIR) is one of the most in-depth analysis of security breaches ever compiled....

Topics: Cybersecurity

Zack Finstad

Author: Zack Finstad

Date: 04/24/2018

7 Common Signs of a Computer Hack and How to Prevent It

A few months ago, a customer called the Gordon Flesch Help Desk to say she couldn’t open a file on her server’s shared drive. She also noticed that the file extension on the spreadsheet she was trying to open had...

Topics: Managed IT, Cybersecurity

David Eichkorn

Author: David Eichkorn

Date: 02/27/2018

All About the Blockchain: The Next Generation of Cybersecurity

If there’s a list of the top 10 rules of technology, the number one rule is probably this: You’ll hear a lot of talk before you see what all the talk is about. 

This year, the most hyped new technology you’ve...

Topics: Managed IT, Cybersecurity

David Eichkorn

Author: David Eichkorn

Date: 01/09/2018

Beyond Spectre and Meltdown: Finding Security in an Insecure Age

Newly Discovered Security Flaws Are Built into Almost All Computers. But You Aren’t Defenseless.

Topics: Managed IT, Cybersecurity

 

Cybersecurity Tips For Employees

Need More Information?

We’re ready – and eager – to help you solve your technology challenges.