Network Security: Can Your Company Survive a Cyber-Attack?
Tuesday, 21 July 2020
On July 15, several high-profile Twitter accounts were hacked to spread a cryptocurrency scam. Twitter has enterprise-level network security, so how did hackers gain access to these profiles? Twitter reported that the hackers used an internal admin tool to gain access to the accounts. Specifically, the company tweeted that “a coordinated social engineering attack” on
- Published in Tech Blog
No Comments
Cinch I.T. Is One of America’s Fastest-Growing IT Service Providers
Monday, 15 June 2020
Cinch I.T. Ranks No. 3151 on the 2019 Inc. 5000 With Three-Year Revenue Growth of nearly 67% NEW YORK, August 14, 2019 – Inc. magazine today revealed that Cinch I.T. – a top I.T. service and computer support provider – is No. 3151 on its annual Inc. 5000 list, the most prestigious ranking of
Cybersecurity: How to Transition Back to the Office
Tuesday, 09 June 2020
In light of the COVID-19 pandemic, businesses across the country are trying to figure out how to transition back to work. Cybersecurity is a primary concern for these companies. Companies all over the U.S. have weighed the benefits of moving to a remote workforce model. That said, not every industry had the chance to do
- Published in Tech Blog
Why You Need a Business Continuity Plan
Thursday, 07 May 2020
We don’t always get advance notice that a crisis is about to start. Even with ample heads-up, you still need a business continuity plan to avoid significant disruption to your business. To allow your company the best chance at surviving during a disaster, you need to produce a modern, accessible plan. Once finished, you should
- Published in Tech Blog
How to Manage a Remote Workforce
Thursday, 09 April 2020
The COVID-19 pandemic has led many businesses to work from home for the first time. The transition to a remote workforce presents its own challenges that might seem daunting, but with the right structure, you can get back to business. When your communication and productivity is on the line, you’ll want to manage your whole
- Published in Tech Blog
Cybersecurity: How to Safely Work from Home
Tuesday, 24 March 2020
As the global COVID-19 pandemic continues to disrupt the U.S. economy severely, cybersecurity has become more crucial than ever. Working from home is no longer a periodic benefit for many Americans but a requirement for many businesses to stay open. However, operating safely and effectively from a remote setup involves extra security measures. While working
- Published in Tech Blog
Malware Focused On Mobile Banking Increased In 2019
Wednesday, 14 August 2019
Researchers at Kaspersky Lab have been tracking a disturbing new trend. In the first quarter of 2019, the company has noted a massive 58 percent increase in modifications of various banking Trojan families that have been used in attacks against more than a quarter of a million users around the world. This increase is troubling
- Published in Tech Blog
Windows Possibly Removing Option To Use Outdated Wifi Connections
Wednesday, 07 August 2019
If you haven’t already installed the 1903 Windows 10 update released in May, be advised. When you install it, you’ll start seeing warning popup boxes any time you connect to a WiFi network that is using TKIP (Temporal Key Integrity Protocol) or WEP (Wired Equivalent Privacy) to encrypt and secure those connections. The particulars of
- Published in Tech Blog
Survey Shows Employees Would Compromise Company Data
Wednesday, 10 July 2019
A recent report published by nCipher confirms what many business owners have known for a long time. Their employees are the weakest link when it comes to data security. The nCipher report, however, adds a disturbing exclamation point to the data with a few details you’re likely to find shocking. First, fully 71 percent of
- Published in Tech Blog
What is the Cloud: A Simple Analogy
Monday, 17 September 2018
You use the cloud and don’t even know it. Do you go to Amazon and create a wishlist? Do you have an email account on Yahoo? That is cloud computing. All your emails are stored on Yahoo servers somewhere. They are on physical servers, of course, but they aren’t on your laptop. The advantage is
- Published in Tech Blog