IRS

IRS Ransomware Scam

8/30/17

All of us mildly panic when the IRS comes a calling-unless they are offering a refund. No one (other than a CPA) likes a tax audit, even if our finances are squeaky clean. Unfortunately, hackers are now exploiting our fear of having the government comb through our accounts, or on the other hand,...

Read More
cloud-based communications

How SMBs Can Benefit from Cloud Communications

8/29/17

Today’s business environment is much different from 20 or even 10 years ago. Employees are more productive and expect more from their business tools, while companies run a tighter, more streamlined work environment. As a result, every tool is utilized to its fullest capabilities, with little room...

Read More
Decrypt

Why Your Network Security Needs to Decrypt Traffic to Stop Hidden Threats

8/25/17

Most of your web sessions are likely now encrypted with Secure Sockets Layer/Transport Layer Security (SSL/TLS) encryption, or HTTPS. This is because there is a huge trend in the industry today that wants to move towards an all-encrypted Internet to achieve two key objectives: • Make it more...

Read More
Hackers Using Ransomware

Hackers Using Ransomware to Target Medical Industry

8/24/17

Hackers Using Ransomware to Target Medical Industry The threat of Ransomware grows daily for today's business owners. Risking your company's data without secure protection is a losing bet. But many folks still want to cover their ears and pretend this isn't a real conversation in the SMB...

Read More

5 Ways Cloud Communications can Improve Customer Relationships

8/22/17

Your company prides itself on its stellar customer service. Whether its onboarding new customers or addressing an issue a current customer may be having, your employees understand the importance of making—and keeping—customers satisfied. But the tools you use to interact with your customers...

Read More
ransomware

What Can You Do to Stop Ransomware?

8/17/17

Ransomware Running Rampant This summer, two catastrophic ransomware attacks--WannaCry and NotPetya bombarded corporations across the globe. As the ransomware threat continues to magnify its reach, it's imperative to learn how you can protect against ransomware. Ransomware Protection Strategy A...

Read More
Skeptic

Why You Need to be an Email Skeptic

8/09/17

You can learn a lot from Facebook. Maybe too much--which is why being an email skeptic these days is a good idea. A security researcher decided to see how hard it would be to create a targeted phishing attack on a total stranger. He went to Facebook and found a guy he did not know personally and...

Read More

Does Your Business Need to Work With a Managed Service Provider?

8/09/17

IT managed service providers deliver the technical expertise small businesses need at a much lower cost than hiring IT staff. They can recommend, install, and manage technology according to business’ objectives and core competencies and ensure that critical data is safe.  That’s why nearly 70%...

Read More
email

Tricked by Phishing Emails?

8/07/17

It’s easy to get tricked by phishing emails. Not long ago I received a Linked In invite from my boss. I didn’t even think twice, I just clicked. Of course I thought plenty about that little click after the skull and crossbones popped up on my screen. How do you know if an email is a...

Read More
Utilities

Why Hackers are Targeting Business and Utilities

8/03/17

While ransomware seems to be a bigger threat to individual users, more information can be gathered and damage inflicted if hackers gain access to companies and utilities. Sometimes these hackers are individual actors; sometimes they are government-sponsored. In any case, there is no limit to the...

Read More