by Brittany Gonzalez | Nov 21, 2019 | Business Continuity, Business Internet, Business Protection, Cloud Solutions, Security, Tech Tips
The difference between penetration testing and vulnerability scanning can be rather confusing for some. Penetration testing, also referred to as pentesting, is a manual process used to identify and recognize possible risks and vulnerabilities within a network that can...
by Brittany Gonzalez | Jul 31, 2019 | Business Continuity, Business Protection, Cloud Solutions, Security
There are an array of situations that can bring your business to an unexpected halt. Shockingly only 30% of small businesses have set up business continuity plans. Business continuity planning is one of the most crucial factors of any recovery procedure. Follow these...
by Brittany Gonzalez | Jul 9, 2019 | Business Protection, Security
3 Easy Steps to Prepare Your Business For Hurricane Season Did you know that 40% of small businesses that close due to hurricane damage do not reopen? In order to prevent your business from being another statistic, follow these key steps. It is crucial to begin...
by Brittany Gonzalez | Sep 6, 2018 | Business, Business Internet, Security, Tech Tips
Unfortunately, cyber crime such as hacking is a common issue today in our society given that we rely heavily on computers and smart devices in most aspects of our lives. The first tip for cyber security against such a crime starts with a secure password. Many cyber...
by Brad Ferguson | Jun 14, 2017 | Security
Microsoft’s Patch Tuesday update today included a massive 95 fixes that tackle vulnerabilities in Windows, Office, Skype, Internet Explorer and its Edge browser. Twenty-seven of Microsoft’s patches fix remote code execution issues, allowing attackers to remotely take...
by Brittany Gonzalez | May 19, 2017 | Security, Uncategorized
Massive cyberattack targeting 99 countries causes sweeping havoc Hospitals, major companies and government offices have been hit by a massive wave of cyberattacks across the globe that seize control of computers until the victims pay a ransom. ...