Creating a Culture of Security

November 16, 2020

It seems we can’t go more than 24 hours without hearing about the latest and greatest data breach affecting millions. These headlines are worrisome and have lead to many sleepless nights for business leaders at small and medium-sized businesses. 

Read More »

Cybersecurity, Network Security, IT Solutions & Support, Cloud Security

3 Effective Password Policies You Can Use

October 28, 2020

At the heart of any effective cybersecurity posture lies well-developed security policies and plans. You need these documents to demonstrate to stakeholders and employees how your company protects itself and its information technology assets. Safeguarding your most precious information assets is not just a job for hardware and software. It's also the responsibility of staff to be part of the solution. This can be accomplished by setting clear and effective password policies.

Read More »

Network Security

Why You Need a Human Firewall for Network Security

August 07, 2020


Does this common headline make you wonder if you have taken the right steps to protect your small and medium-sized business (SMB)? Let's assume you have a robust firewall, up-to-date antivirus, and a current patching program. Your remote employees are working from a private VPN, ensuring secure network access. You've created a password policy requiring complex passwords that must be changed frequently. And recently, you've implemented multi-factor authentication (MFA), adding extra security against compromised credentials. If this describes your network security, then you are on the right track, but have you considered the human element?

Read More »

Network Security

Corporate WiFi vs. Guest WiFi Access - Does it really matter?

May 14, 2020

Most businesses have some form of a wireless network (WiFi) in place, but is it really necessary to set up a separate guest wireless access? There are a few good reasons why this is an important step to take. We know having WiFi is imperative for employees who move throughout the office, but it also makes sense to offer wireless access to your guests, customers, vendors, and auditors. It's a cybersecurity best practice to set up a guest wireless network that is segregated from the corporate network, and here's why.

Read More »

Network Security, IT Solutions & Support

Latest Video Conferencing Phishing Email Scams

May 12, 2020

The prevalence of video conferencing is changing the way we conduct business. As we adapt to this new meeting practice, cybercriminals are adapting as well. The recent surge in use of cloud-based video conferencing technologies creates opportunities for cybercriminals to reengineer their phishing tactics.

Read More »

Network Security

Easy Ways to Hack Company Email

April 17, 2020

Every morning we log on to our corporate email and begin the day sifting through a myriad of messages, most of which are equally important and needing action. Likely, you haven't even finished your first cup of coffee and not focused on the cybercriminal who is hoping you will react to their highly sophisticated phishing email waiting in your Inbox. So how do you recognize and react to the myriad of fake emails coming at you multiple times a day? 

Read More »

Cybersecurity, Network Security

Five Compelling Reasons to Hop on the Fast-Moving SD-WAN Wagon

January 25, 2019

If you haven’t heard the term “SD-WAN” (software-defined wide area network) by now, you’re either awakening from a two-year coma, or you haven’t been paying close attention to the onslaught of demonstrative offers, vendor emails, and introductory phone calls likely thrown in your direction.

The topic of SD-WAN has become the moniker for “building your company’s next WAN design." Needless to say, the term is out there as a hot topic, information is readily available, and most people feel that SD-WAN will be a positive disruption over the next three to five years. Due to the fact that clients want to build a better WAN experience with the benefit of lower costs, this makes perfect sense. Let's explore. 

Read More »

Business Transformation, Network Security