Executive IT Help

RECOGNIZE PHISHING EMAIL SCAMS

Social Engineering Red Flags #1: Sender   The prevalence of phishing scams is at an all-time high. Because you are the key to preventing a cyberattack, it is important to question the legitimacy of every email you receive. Below is a list of questions to ask yourself about...

Social Media Quizzes – Fun and Harmless?

Fun and Games until you realize you just gave out the answers to your bank account security questions Browsing through my timeline on Facebook, I see many of my friends answering personality quizzes or answering seemingly harmless questions.  Its social media, we’re supposed to...

What is BDR? Backup and Disaster Recovery Explained

Backup and disaster recovery (BDR) is a combination of data backup and disaster recovery solutions that work cohesively to ensure a company’s business continuity and computer security.  Offsite cloud backups protect your data and with a Business Continuity plan, you can run your...

Recognizing Phishing Emails – Stay Safe

Recognizing Phishing Emails is the Key to Staying Safe Phishing emails are becoming much more common.  No one is immune.  If you have an email account, you will receive a phishing email at some time or another.  So, what exactly is phishing and how do you recognize it? “Phishing...

Elderly are Easy Targets for Scammers

Help with Technology and registering online accounts may protect them After recent changes in an elderly family member’s mental state, it was necessary to start managing her affairs.  She had no online presence and had always felt that kept her secure.  She wanted nothing to do...

Hurricane Harvey – BDR and Business Continuity

It’s been about three weeks since Hurricane Harvey dumped over 50 inches of rain on the Greater Houston area over a four day period.  Portions of Houston are still under water and will remain so for a few weeks at least.  Homes and businesses that had never flooded before were...

HELP WANTED: HIRING THE RIGHT IT PERSON FOR YOUR SMB

Are you still trying to find the right IT person for your SMB? Browsing through job listings, there are quite a few small and medium size businesses searching for the right person to be their “IT Dept”.  They may be better off considering outsourcing IT Services instead.  The...

SECURING YOUR DIGITAL ENVIRONMENT

With ransomware and other malicious attacks on the rise, securing your data is more important than ever.  A common vulnerability is running outdated software.  Professional software is expensive, so transitioning to new versions of office software including operating systems on...

CYBER-CRIMINALS ARE WORKING FULL TIME TO ATTACK YOUR SYSTEM

Cyber-criminals are working full time to develop new methods of attacking your system with ransomware, are you working as hard to protect it? Hackers infect through email, unsecured websites and probe ports on your servers through the internet looking for open ports and other...

DON’T GAMBLE WITH YOUR DATA’S SECURITY

Data is among your company’s most valued assets. In fact, a recent FEMA report estimates that 40 to 60 percent of small to midsize businesses won’t survive a data calamity.  Ransomware is one of the most prolific and damaging of cyber-attacks in the world. We discussed this in...
12