The Blog

Free Tips & Tricks
Cinch I.T. > The Blog (Page 14)

In the 1930's, France built a trench network called the Maginot Line to rebuff any invasion. The philosophy was simple: if you map out all the places an enemy can attack, and lay down a lot of men and fortifications at those places, you can rebuff any attack. The problem is, you can't map every possible avenue for attack.   What does this have to do with...

Read More

Phishing Scams – A People Problem There are some things that only people can fix. There are many security risks to which your data is susceptible, but there is one method that remains a wonderfully effective hacking tool. That is the phishing scam. This is a legitimate looking email that asks the reader to click on a link. If clicked, the link can infect the user’s...

Read More

You hear on the news all of the time about big cyber attacks on large corporations, and even government agencies. The trouble with this news coverage is that is suggests a distorted view of where cyber attacks are taking place. These attacks are not solely hitting large organizations. Small firms represent a significant portion of those who face cyber attacks. Being small by no means...

Read More

It is Heaven! Using the Cloud to Challenge Big Business   Has anyone suggested you begin moving your business to the cloud? Cloud data storage or cloud computing? What is this, anyway? And isn't it something for huge companies?   In the last post we explained what cloud computing is. Simply put, it is the offsite storage of your data, and perhaps even the software packages you use. The...

Read More

For several years now, Worcester Business Journal has asked its readers for the best companies to do business with. And each year, since 2014, the end result is this WBJ Best of Business list. This year, the WBJ had a record number of voters recommending their top companies in at least 10 of the categories. We are proud to announce that Cinch IT, Inc. was...

Read More