Blog

Blog

What You Need to Know About Office 365 Before You Buy It

This post was originally written in late 2016. It was edited and updated with new content in early 2018.

Moving your company to the Cloud (or moving between different Cloud services) is no small endeavor. Deciding which service to choose and what plan to go with can require a fair amount of research to make sure you’re getting the best solution for your needs.

One of the most popular options for businesses is Microsoft Office 365. We’ve compiled some of our most popular Office 365 blog posts to help you with your research.

Read More »

Don't Shortchange Technology in Your Small Business

(This article, written by PTG CEO Reed Wilson, originally appeared in the 2017 GSA Book of Experts)

At PTG, we’ve had the benefit of working with small businesses all over the US. While I don’t have empirical data, my hunch is that those who outperform their peers pay attention to three key areas when it comes to technology in their businesses.

 

 

Read More »

Watch Out for These W2 Phishing Emails

Tax season is starting, and along with it come the tax-related phishing emails. We’ve already started seeing emails this year that look like W2 notifications. Be on the lookout for these, and other tax-related scams.

Read More »

Watch Out for These "Secure Email" Phishing Emails

We typically stick to writing about phishing emails and attacks aimed at businesses, but a recent trend has us making an exception. We’ve seen a HUGE uptick recently in a type of phishing emails targeted at individuals: emails posing as an encrypted email notification. Sometimes, these are pretty generic. Sometimes, they’re much more detailed and look like emails about mortgages or title loans.

The scariest part of this trend? These are convincing – some of the most convincing we’ve ever seen. Most have had very few warning signs that they’re a phishing email.

Read More »

2017 PTG Award Winners

Each year, we celebrate our previous year and kick off our new year with an annual Kick Off Party.  We forego the annual Christmas party (not because we are Scrooges, but because it’s such a busy time) and use this time to reflect on our previous year and get geared up for our upcoming year.

At the Kick Off Party, we also give out awards to recognize team members who have had outstanding accomplishments.  If you see any of this year’s award winners – please tell them congratulations! These are the 2017 winners:

Read More »

How to Reset Windows Hello Biometrics

Using biometrics (your fingerprint or your face) to log into your computer can be much more convenient and secure than using a password, especially when used as part of multi-factor authentication. You don’t have to change it frequently, and it’s much harder to steal (though it can be done).

Read More »

Your New Year’s Resolution: Make Cybersecurity a Habit

Happy 2018! For 40% of Americans, the new year means setting a New Year’s Resolution – have you made one? What about for your business? In 2018, we challenge you to make your (business) New Year’s Resolution to take data security seriously. But not just that – we challenge you to make cybersecurity a habit.

Read More »

Our Top Blog Posts of 2017

 2017 is coming to a close, and we’re counting down our top blogs post of the year. Most of these posts weren’t written in 2017, but continue to be our most popular posts.

Not surprisingly, most of these focus on Office 365. We’re happy to see a security-based blog on here! Cybercriminals often target businesses based on the technology they use and knowing the red flags and warning signs to look out for is a huge step in the right direction towards keeping your business secure.

Read More »

How Cybercriminals Use Your Sense of Urgency Against You

Picture this scenario: A low to mid-level employee gets an email from the CEO. He needs the lower level employee to wire him money right away and provides wire transfer information. An important client is upset, and they need this money to keep the client satisfied. Or the CEO is traveling, his wallet was stolen, and he needs money to be able to get a flight home.

The lower-level employee, not wanting to disappoint their superiors or their clients, comply and wire the money quickly, and without question. Except it’s not the CEO. It’s a cybercriminal, this was a phishing attack, and now the company is out thousands of dollars.

This scenario plays out all the time in businesses all over the world. Phishing attacks like these prey on your sense of urgency to scam you out of thousands of dollars.

Read More »

How to Prevent Common Mistakes in Outlook

If you’re a human, you’ve probably had at least one embarrassing moment in your career involving email. Maybe it was an awkward typo, or you called someone by the wrong name. Or you missed an email from a prominent client or your boss.

If you’re using Outlook for email, though, there are a few features and add-ins you can use to help check yourself – or at least give yourself a little extra time to catch your mistakes. 

Read More »
   

Subscribe to Our Newsletter

Ultimate Guide to Small Business Cyber Security