JOIN OUR TEAM
David Eichkorn

Author: David Eichkorn

Date: 10/17/2019

6 Proven Ways to Secure a Computer Network

Computer and network security breaches seem to be in the news every day, and they’re costing the organizations that fall prey millions of dollars. In fact, IBM reports that the average cost per incident rose yet...

Topics: Managed IT, Cybersecurity

Mark Flesch

Author: Mark Flesch

Date: 10/15/2019

Want to Learn How to Secure Print? Here's 3 Ways to Do It

Did you ever wonder how a hacker launches a worldwide attack? Last year, the hacker @HackerGiraffe launched a worldwide printer hack, resulting in crude messages being printed out on thousands of printers worldwide.

Topics: Managed Print, Cybersecurity

David Eichkorn

Author: David Eichkorn

Date: 10/10/2019

How to Evaluate a Managed IT Service Provider in 5 Simple Steps

According to Deloitte’s 2019 Global Cost Technology Survey, companies report their greatest internal threats as maintaining the reliability of their systems, closely followed by the recruitment, development and...

Topics: Managed IT, Cybersecurity

David Eichkorn

Author: David Eichkorn

Date: 08/07/2019

The Growing Cybersecurity Threat for Small Businesses 

Brookside ENT and Hearing Center was a small medical practice in Battle Creek, Michigan until it was hacked and held for ransom by cyber criminals.   

Topics: Cybersecurity

Chera Pupi

Author: Chera Pupi

Date: 05/23/2019

7 Signs of a Phishing Scam — Clues to Look For [VIDEO]

Even with all the latest technology, IoT gadgets and advanced artificial intelligence being leveraged by businesses these days, hackers and cybercriminals continue to rely on old, time-tested methods for stealing...

Topics: Cybersecurity

Chera Pupi

Author: Chera Pupi

Date: 05/09/2019

Navigating the Cybersecurity Maze — The Best Defense Against Hackers

We get it. Trying to understand cybersecurity technology for your business can be scary, confusing and daunting. Too often, cybersecurity service providers act like they can flip a switch and magically fix all your...

Topics: Cybersecurity

Mark Flesch

Author: Mark Flesch

Date: 04/30/2019

Developing a Disaster Recovery Plan — 5 Essential Elements

Whether it’s hurricanes hitting coastal regions or wildfires scorching the West, those in the path of these devastating events were unable to escape damage. In some cases, they lost everything.

Natural disasters...

Topics: Managed IT, Cybersecurity

Jeff Dotzler

Author: Jeff Dotzler

Date: 04/24/2019

Will You Get Sued if Your Business is Hacked?

Last year, a Chicago-based medical records company called Allscripts was the victim of a malware attack. Hackers were able to break into the company’s computer systems and encrypt files, making it impossible to read...

Topics: Managed IT, Cybersecurity

 

Cybersecurity Tips For Employees

Need More Information?

We’re ready – and eager – to help you solve your technology challenges.