Blog

Blog

Don’t Make These Mistakes When Implementing New Technology

Wrackspurt Industries is instituting a new software for their employees to use to replace some existing systems. The leadership team at Wrackspurt is excited, since the new software promises to increase productivity and reduce friction between departments.

They’ve heard good things from other companies who use the software and the employees involved in the decision-making process said it would work well. Ernie, who championed the software, has done a trial and thought it has the potential to save the company a lot of money.

Fast forward some. The new software is in place—but not much has changed. Some people use the software a lot. Some people don’t use it at all. Some employees complain that the new software doesn’t do what they need it to do. There were some issues during rollout that meant some data was lost, and some people are still dealing with that. Ernie’s reputation has taken a hit for championing something isn’t going well—even though it’s worked great for other companies.

So, what happened? And how do you prevent it from happening in your business when you make a software or technology change?

Read More »

Watch Out for This Multi-Step Phishing Attack Costing Companies Thousands of Dollars [Video]

 

Don’t want to watch a video? Here’s a summary. Please note, this is not an exact transcript.

We’re talking about a multi-step attack targeting businesses in every industry. This attack can cost you thousands of dollars (we've seen companies lose $100,000+!). We’re a Microsoft partner and have specifically seen this with Office 365 users, but it’s happening with users for all kinds of Cloud accounts, including Office 365, Google for Work, DropBox, etc.

Read More »

When You SHOULDN’T Move Your Business to the Cloud

 You’ve probably heard the benefits of moving your business to the Cloud by now: promises of improved productivity and the ability to work anywhere, without sacrificing your security. And these benefits are real for most companies!

But the Cloud isn’t the perfect fit for every company. If you fit any of these scenarios, moving everything to the Cloud isn’t going to provide these benefits—in fact, it could hurt you.

 

Read More »

When should I upgrade my business from Office 365 to Microsoft 365?

 

If you are already using Office 365, moving to Microsoft 365 is typically a logical jump as your company matures. Microsoft 365 includes parts or all of Office 365, Enterprise Mobility + Security, and Windows 10 (exactly what you get varies by plan), managed in one portal.

The tricky part is knowing when to make the jump, especially if you want to move everyone in your company at once. There are a few times when it makes sense to move:

Read More »

Could your vendors’ cybersecurity put you in danger?

You probably remember the massive Target breach a few years ago. Millions of credit card numbers were stolen from Target’s customers and their reputation took a huge hit around the busiest shopping season of the year.

What you probably don’t remember is the name of the company that was actually hacked—it was an HVAC company who sometimes did work for Target stores. The air conditioning company was hacked, and the cybercriminals used their access to Target’s system to cause massive amounts of damage.

When implementing a cybersecurity plan, most business owners only consider their own company. But you also need to consider the cybersecurity policy of your vendors—especially if they have access to your network or your sensitive data.

Read More »

6 Things Every Financial Services Firm Needs to Know About Cybersecurity

Financial service firms stand to lose big if they fall victim to an attack. It’s not just your data that’s on the line—it’s your money and your reputation, too. When it comes to putting together a cybersecurity plan to keep your business safe, there are a few things every financial services firm needs to know:

Read More »

How Cybercriminals Use Current Events to Target You

No doubt over the past few weeks you’ve been inundated with emails about privacy policies and email subscription updates as companies worked to meet new EU regulations (GDPR) that went into effect on May 25. Cybercriminals used this flood of emails to their advantage, sending out similar emails to try to trick you out of your password and credit card details or trick you into downloading ransomware.

This is part of a much larger trend of cybercriminals using current events to try to trick you. When you’re expecting to see an email about a particular event or subject, you probably won’t notice something suspicious.

Read More »

What You Need to Do to Secure Your Company's Office 365 Environment

Office 365 operates under a shared security responsibility model—meaning you are responsible for some of the security of your company’s Office 365 environment.

Most notably, you are responsible for access. You are responsible for who you let into your environment, whether intentionally or unintentionally.

 

Read More »

Three Major Reasons You Should Talk to Your IT Company Before Switching ISPs

Switching internet service providers in your business can seem like no big deal. That $100 per month plan for internet can save you a lot of money and internet is internet, right? There isn’t a reason your IT company needs to be involved, right? Not so fast.

There are actually three pretty big reasons you should involve your IT company before switching internet service providers (ISPs): your IT company can help you make sure you are actually getting what you need and that you’re getting it for the best price—and they can keep your network running while you make the switch.

Read More »

Why CEO Impersonation Attacks are So Hard for Spam Filters to Catch

 

CEO Impersonation attacks, including wire fraud attacks, have become a favorite for cybercriminals because of the potential of a huge payday. A successful attack usually means tricking the victims out of thousands of dollars—we’ve seen up to $100,000 taken. And they’re almost impossible for even the best email filters to catch.

Read More »
   
Ultimate Guide to Small Business Cyber Security