Windows 7 End of Life Just as everything dies, Windows 7 is reaching it's end of life. It may be sad for some, but Microsoft will no longer be supporting it as of January 14th, 2020. So the question stands, what do you nee... Cybersecurity News Jul 26, 2019
6 Ways We Shield Your Business From Ransomware One of the most frightening and infuriating types of malware out there is known as ransomware. What ransomware does is lock or encrypt the data on a device in order to make it inaccessible and then, a... Cybersecurity Malware Managed Services Mar 15, 2019
Inside Secure-IT: Network Security and Device Protection Welcome to the Inside Secure-IT series of articles. Inspired by a post done by the US-CERT at the beginning of October describing the threat posed to MSP's by hackers and other ne'er-do-wells. Our res... Cybersecurity Dec 14, 2018
Inside Secure-IT: User-Based Security and Password Management Welcome to the Inside Secure-IT series of articles. Inspired by an alert from the US-CERT at the beginning of October describing the threat posed to MSP's by hackers and other ne'er-do-wells. Our resp... Cybersecurity Dec 7, 2018
Inside Secure-IT: Physical Security Welcome to the Inside Secure-IT series of articles. Inspired by an alert from the US-CERT at the beginning of October describing the threat posed to MSP's by hackers and other ne'er-do-wells. Our resp... Cybersecurity Nov 30, 2018
Inside Secure-IT: Backups and Recovery Welcome to the Inside Secure-IT series of articles. Inspired by a post done by the US-CERT at the beginning of October describing the threat posed to MSP's by hackers and other ne'er-do-wells. Our res... Business Continuity Cybersecurity Nov 16, 2018
What is a pop-up and how can I get rid of them? Most people know what a pop-up ad is, but even if you have never heard of one before their description is in the name! And they are just as annoying as they sound... They are advertisements that with ... Cybersecurity Malware Tech Tips Jun 22, 2018
What is a Rootkit? A Rootkit is a piece of malicious software that hides itself on your computer and gives an unauthorized person control of the machine and access to the information on it. It goes without saying that t... Cybersecurity Malware Jun 15, 2018
Spam Emails and Getting Rid of Them Email spam, also known as junk, refers to all the unsolicited emails you receive and do not want to deal with (usually because they contain malicious links or viruses.) These shady emails are the ones... Cybersecurity Malware Jun 1, 2018
The Different Types of Malware What is Malware? Malware is short for malicious software and comes in many different forms. While some may believe that its purpose is to slow down or make a computer unusable, in reality that's only ... Cybersecurity Malware May 25, 2018
Online Gaming Risks and Warnings The dangers of the internet for kids has been known for practically three decades. Given all the tech advancements since then, that seems like a very long time. So why are we still facing online gamin... Cybersecurity May 4, 2018
Cloud-to-Cloud Backup - Safer, smarter and more secure Small Businesses Are at the Front Lines in an Almost Constant Attack of Hackers. These Companies Cannot Afford Downtime. As we move into the information era, data becomes a foundational element of bus... Business Continuity Cybersecurity Apr 27, 2018