JOIN OUR TEAM
David Eichkorn

Author: David Eichkorn

Date: 03/14/2019

You’ve Been Hacked — A Look at Cybersecurity’s 20 Year History

Co-written by Jason Krause and David Eichkorn

Jason Krause has been writing about technology since around 1995, starting with the now-defunct BYTE magazine. He remembers covering such great, forgotten controversies...

Topics: Managed IT, Cybersecurity

Steven Freitag

Author: Steven Freitag

Date: 01/22/2019

Beware of These 5 Most Common Cyberattacks!

Hackers will try every deceptive tactic they can find to steal data, disrupt businesses and hold systems hostage. But truth be told, some cyber criminals don’t have to try very hard. Unfortunately, many businesses...

Topics: Managed IT, Cybersecurity

David Eichkorn

Author: David Eichkorn

Date: 12/13/2018

5 Steps to Better Cybersecurity For Businesses

Too many businesses treat cyberattacks like an act of God or extreme weather – something that is potentially devastating but nothing you need to think about on a day-to-day basis. But a cybersecurity breach is not...

Topics: Managed IT, Cybersecurity

David Eichkorn

Author: David Eichkorn

Date: 11/29/2018

5 Simple Ways To Help Ensure A Secure Computer Network

Computer and network security breaches seem to be in the news daily, and they’re costing millions of dollars to organizations that fall prey. In fact, IBM reports that the average cost per incident rose 6% in 2018...

Topics: Managed IT, Cybersecurity

David Eichkorn

Author: David Eichkorn

Date: 10/30/2018

Top 10 Downright Scary Cybersecurity Facts for 2018

October is the month we associate with things that go bump in the night — that time when children, sometimes disguised as tricksters, go door to door. It’s also a time when people acknowledge a different kind of...

Topics: Cybersecurity

Mark Flesch

Author: Mark Flesch

Date: 10/04/2018

The Dangers of Unauthorized File Sharing, and Tips for Business

Does your business have a handle on all the ways employees share information across departments and with others outside your organization?

In an effort to improve productivity and efficiencies, employees often use...

Topics: Cybersecurity

Kirk Hoeppel

Author: Kirk Hoeppel

Date: 09/20/2018

What is the Dark Web and Why Should My Business Care?

There’s a lesser-known “dark side” of the internet, known as the Dark Web — a place where most cybercrime and other criminal activities originate. Users of the Dark Web encrypt their online activities to remain...

Topics: Managed IT, Cybersecurity

Jim Tarala

Author: Jim Tarala

Date: 09/13/2018

Malicious PDFs: How This New Cyberattack Could Steal Your Company’s Emails

Imagine finding out that someone in your office was quietly monitoring all your incoming and outgoing business communications. That person then copied every message you sent and emailed all the information to a...

Topics: Cybersecurity

 

Cybersecurity Tips For Employees

Need More Information?

We’re ready – and eager – to help you solve your technology challenges.