There comes a time when every business needs to invest in a phone system: they’re buying a new phone system for their new location or they’re upgrading from an older system. Regardless of the reason, they’re ready to make the commitment. Your phone connects you to your customers, so you need it to be reliable. […]
We all want to protect our businesses. They’re a part of who we are, and it would be devastating if anything bad happened — including an unexpected cyberattack. But it happens. Businesses are attacked every single day. Some businesses are left in ruin. Some can pick up the pieces, but at great cost. Then there […]
Cybercriminals and hackers are rarely shy about the methods they use to attack their victims. Many of them are more than happy to share how they broke into a business’s network or how they walked away with thousands of dollars after successfully extorting a business owner whose company is now destroyed. There are new stories […]
Out with the old and in with the new! For far too long, small businesses have taken an old-school approach to IT services and security. In other words, they wait until something goes wrong before they call an IT services company and request help. Back in the day (think 1990s and 2000s), this approach worked, […]
Late last March, the infrastructure of Atlanta was brought to its knees. More than a third of 424 programs used nearly every day by city officials of all types, including everyone from police officers to trash collectors to water management employees, were knocked out of commission. What’s worse, close to 30% of these programs were […]
Back in 2014, Code Spaces was murdered. The company offered tools for source code management, but they didn’t have solid control over sensitive information — including their backups. One cyberattack later, and Code Spaces was out of business. Their killer had used some standard techniques, but the most effective was getting an unwitting Code Space […]
Yet how could you possibly relax if some random bit of malware, software glitch or cyber-attack catches you off guard just as you’re walking out the door? A well-designed secure computer network gives you the confidence that “all systems are go,” whether you’re having fun in the sun, or just getting things done with your […]
You stride into the office early one Monday morning. You grab a cup of coffee, flip on your computer and start checking e-mail… A note pops up that rivets your attention: “Your files have been encrypted. Send $5,000 within five days or they will all be destroyed.” You start sweating as your throat constricts and […]
Ryan loved tweaking photos on his Android phone. He’d heard rave reviews from his friends with iPhones about Prisma, a new iOS app for image editing. So when he heard Prisma would soon be released for Android, he logged in to the Google Play Store to see if it was there yet.
Efficient Escrow of California was forced to close its doors and lay off its entire staff when cybercriminals nabbed $1.5 million from its bank account. The thieves gained access to the escrow company’s bank data using a form of “Trojan horse” malware.