Don't Get Hooked by Spear Phishing Attacks

by Jonathan "JB" Bowen / February 20, 2019 / Latest News

Phishing attacks have been around for a long time in IT.  Designed to steal your credentials or trick you into installing malicious software, they have persisted in the IT world precisely because they have been so devastatingly simple and..

Read More
Jon Wright

Professional Businesses Deserve a Professional Setup

by Jon Wright / February 13, 2019 / Latest News

Watching a business grow is as satisfying as it is rewarding.  Whether opening a new office, starting a new department, or bringing in a new employee; it's a positive step in the right direction.  Upward growth often requires new office tech and IT..

Read More
Andy Mudd

Is Your Physical Security as Good As Your Cybersecurity?

by Andy Mudd / February 6, 2019 / Latest News

Headlines are often made by firms that have been hacked by "elite" cybercriminals.  These events sound high tech, sophisticated, and interesting.  The truth is almost always an amateur attacker chancing their luck with an unpatched security hole..

Read More
Steve Weigle

Invest Well in Your IT Security

by Steve Weigle / January 30, 2019 / Latest News

"If it ain't broke, don't fix it" is a common and useful rule for many business owners.  It serves to protect your business against unnecessary costs and unneeded downtime.  While protecting your business against many types of danger, it poses an..

Read More
Elizabeth Myers

Outsourcing vs Managed IT - What’s the Difference?

by Elizabeth Myers / July 4, 2018 / Latest News

Outsourcing has become a dirty word. It implies you’re taking jobs offshore or giving up oversight over a key part of your business. Managed Services is the complete opposite of that, yet it’s often put under the same umbrella, despite being a..

Read More
Jon Wright

Why Your Business Needs Unified Threat Management

by Jon Wright / June 20, 2018 / Latest News

Sounds scary doesn’t it? Almost like a swat team dressed in black is going to swing in and start yelling orders. While just as effective at disabling the bad guys, Unified Threat Management (UTM) is a special kind of IT solution focused on..

Read More

Should You Pay for a Ransomware Attack?

by Jonathan "JB" Bowen / June 13, 2018 / Latest News

Getting hit with a ransomware attack is never fun, your files get encrypted by cybercriminals and you’re left having to decide: should we pay to get them back? It’s a scene that’s played out across the world with 70% of businesses saying ‘yes’ in..

Read More
Kyle Schroeder

Why Periodic Security Assessments Should Be Your New Normal

by Kyle Schroeder / June 6, 2018 / Latest News

By now you know that building up your cyber security is just as important as building up your cash flow. Both are essential to your success, but while most businesses keep an eye on the financials, they tend to think cybersecurity is something..

Read More
Dalton Bishop

Fake Invoice Attacks Are on the Rise - Here’s How to Spot (and Beat) Them

by Dalton Bishop / May 30, 2018 / Latest News

Businesses around the world are being struck with a cyber-attack that sends victims a fake invoice that looks real enough to fool to most employees. It’s an old scam that used to see bills faxed or mailed in, but it’s made its way into the..

Read More

The True & Unexpected Costs of Being Hacked

by Ashley Riner / May 16, 2018 / Latest News

There are the normal costs everyone associates with a breach, like getting your own server and computers fixed up, with maybe a little downtime. But really, most businesses view the possibility of getting hacked as more of an inconvenience than a..

Read More

Service Expert

Jeremy Nolder

Service Expert

Want More Information?