Technical

Posts discussing a variety of technical topics such as security, infrastructure, applications, servers, VoIP, assessments, data backup and recovery, server migrations, cloud, etc.

5 Ways to Protect Your Network from COVID-19

5 Ways to Protect Your Network from COVID-19

By on Mar 18, 2020 in Security | 0 comments

The unprecedented pandemic caused by the COVID-19 strain is causing health, financial and social crisis worldwide. Populations around the globe are focusing on keeping the virus at bay – except one: population cybercriminal. True to form, cybercriminals around the world are exploiting the public’s fear of contracting the virus and thirst for current to the minute updates to infest business and personal network’s with malware, ransomware and business email compromise.

Read More
Understanding Managed Services and Their Benefit to SMBs

Understanding Managed Services and Their Benefit to SMBs

By on Dec 17, 2019 in Technical | 0 comments

Small to medium sized businesses (SMBs) receive a lot of calls each day from slick sales people peddling the next technology trend that’s going to save them money and revolutionize how they do business. They’re all too quick to caution that if you don’t listen to them, you’ll fall behind the times, and eventually be swimming in a sea of debt and out of business.

Read More
Five Tips to Deflect a Ransomware Attack

Five Tips to Deflect a Ransomware Attack

By on Oct 21, 2019 in Security | 0 comments

Ransomware is malicious software designed to lock computers or data storage until a ransom is paid – keyword malicious. The cyber-criminals who write the code for these attacks mean business, to the tune of millions of dollars lost annually. Here are five tips that could help deflect a ransomware attack on your small to medium sized business.

Read More
5 Tips to Spot a Phishing Email

5 Tips to Spot a Phishing Email

By on Jul 24, 2019 in Security | 0 comments

Phishing emails are an attempt to obtain sensitive or personal information such as usernames, passwords, financial or personal details by scammers who have disguised themselves as a legitimate business or person. The intent is to use this information for illegal purposes. While the hacking world is constantly changing and evolving its methods to fool the end user, below are 5 things to look for that are immediate red flags an email is a phish.

Read More
The Dark Web is Making Businesses Less Secure

The Dark Web is Making Businesses Less Secure

By on Jun 13, 2019 in Security | 0 comments

What many businesspeople might not understand is the role that the Dark Web plays in driving these threats. By providing criminals a safe place to exchange information and access the resources they need, the Dark Web helps perpetuate and spread many of the most dangerous threats sweeping the Internet, leading to direct financial damage on businesses in Ohio and elsewhere.

Read More