Hurricane Season’s Disaster Recovery Plan Checklist

Hurricane season officially started in June and lasts through the end of November. It pays to be cautious and ensure your disaster recovery plan is comprehensive and functioning properly. If your business is in the southeastern U.S. or along the eastern seaboard, you can't afford not to hurricane-proof your disaster recovery plan.

Top 4 reasons for sluggish mobile internet

Fed up with your smartphone because of its slow internet speed? Before you rush off to the nearest electronics store to buy a new one, take a look at these four possible reasons why your phone’s internet connection is slow. Router location One simple yet overlooked reason why your Wi-Fi-connected phone may be experiencing internet […]

The End of an Era: Windows 7 Support Ending

Microsoft announced earlier this year they will be ending support and software updates for Windows 7 operating system on January 14, 2020. Any machine still using the system past that date will be vulnerable to security risks. Approximately 43% of Windows users are still running Windows 7 so this change will impact an enormous number of businesses and users.

Four Types of Hackers You Should Know About

Today’s hackers are often driven by political or financial motivations, or they may seek to gain notoriety. The more we know about how they think and act, the better we can protect our organizations from harm. Small and mid-sized businesses that lack the cybersecurity infrastructure of big corporations are especially at risk of exploitation.

Office 365’s Upgraded Defense Against Email Phishing Attacks

Phishing attacks on small to mid-sized businesses are increasing in frequency and sophistication. Luckily for Office 365 users, some serious updates have been made in the defense against email phishing. In April 2018, Microsoft upgraded Office 365’s Advanced Threat Protection (ATP) features to better detect spoofed emails, compromised accounts, unsafe links, and harmful attachments, and thereby prevent a wide variety of phishing scams.