Fortinet Vulnerabilities Being Actively Exploited
US agencies have warned that advanced persistent threat (APT) groups are exploiting Fortinet FortiOS vulnerabilities to compromise systems belonging to government and commercial entities. These vulnerabilities are known and patches have been issued, but unless IT administrators apply the fixes, Fortinet FortiOS builds remain open to compromise.
Two Post-Pandemic Technology Trends to Plan For
At the heart of everything your business does are two things – people and technology. Your technology and need for flexibility in the workplace has evolved, and the ability to do more with less has increased. The past 12 months have been a time of monumental change for many businesses. Driven by a global pandemic a new era of location independence has emerged and there are changes to be embraced, lessons to be learned, and trends to adopt.
Tool created to aid cleanup from Microsoft hack in broad use
A tool designed to help businesses protect themselves from further compromises after a global hack of Microsoft email server software has been downloaded more than 25,000 times since it was released last week, the White House’s National Security Council said Monday.
Optimizing your team's Office 365 experience
Are you taking full advantage of Office 365? Can your user's experience be enhanced? Can productivity be improved? Here's Microsoft's CIO, Jim DuBois with some deployment recommendations.
Running MS Exchange or Hosted Exchange? What you must do now.
As security experts are called in to assess the depth of security breaches and eliminate bad actors now inside corporate email systems, the fallout and cost is sure to be massive. Businesses running Microsoft Exchange should immediately patch and update software, externally validate patches and proactively hunt for web shells and other indicators of compromise.
As a company grows, its cybersecurity program must grow with it.
All businesses want growth. But success brings greater security concerns. So how does a company scale for growth without becoming a security risk? What are the best things to do to maximize efficiencies and to properly scale your security?
The Cost of Cybersecurity and How to Budget for it
With national news regularly featuring stories of cyberattacks on businesses of all sizes, folks are planning their budgets with cybersecurity in mind. While implementing effective cybersecurity policies is more important than ever, it's important to understand the risks you face and whether you are doing enough to protect yourselves.
Verify. A Public Service Announcement
Following up our post about business email compromise (BEC), here's a 30 second PSA you can share with your office mates and help your team stay safe online
Supply Chain Attack: Everything you need to know, but may not want to...
Where IT directors could literally be faced with “burning entire IT ecosystems to the ground”, here’s everything you should know (in about 500 words) about supply chain attacks in 2021.
Why the Super Bowl Should be Your Reminder to Address Online Security
A breach to an NFL team’s Twitter feed may not seem like the most earth-shattering news. But it’s important that we learn from these attacks and understand the criminal’s motivation in order to better protect our own privacy and security. Have you ever considered what could happen of your company’s social media account was hacked? Here are five reasons that would be bad.
Superbowl Squares for Charity
Do you have a favorite charity that could use some extra cash to start the year? Play our Super Bowl Squares game and you could win for your charity of choice.
A Business Technology To-Do List for 2021
With 2020 behind us, does the flip of the calendar really matter to a small or mid-size business? Given the changes we’ve seen there certainly is a case to be made for a new dawn. Our managing partner, Brandon Marks is here to talk about a few things your business can do.
Cybercriminals are Calling Ransomware Victims
We’re familiar with strong-arm tactics like publishing stolen data online, increasing fines, or threatening to notify the media. But this brazen shakedown is an escalation in ransomware extortion unlike anything we’ve seen.
Are the latest New Jersey Covid-19 Protocols jeopardizing your HIPPA compliance?
Governor Murphy’s executive order mandated New Jersey businesses "conduct temperature screenings, visual symptom checking, self-assessment checklists, and/or health questionnaires." How will this impact your company?
Is your IT service provider leaving you boxed in?
Success in 2020 stems directly from your flexibility and ability to adapt in a world of change and uncertainty. A trusted IT services partner is a must-have, and critical for any organization looking to build or even remain competitive.
Prioritizing Your Cybersecurity Spend in the age of Covid-19
Is cybersecurity more about your company’s culture than your technology? With so many SMB's struggling in an uncertain marketplace, here's how to maximize your investment.
VPN and Remote Desktop are Dead
Remote access to corporate technology (email, data, infrastructure, financials, etc) isn’t new. Most organizations have had some sort of solution in place for at least the last decade, with a few stragglers getting a push from the pandemic.