Blog

Blog

Watch Out for These Fake Social Media Security Emails

One of the most common tactics cybercriminals use when targeting small and midsize businesses in phishing attacks in the form of fake notifications. These are usually meant to try to scare you into some action with messages like “Your account will be suspended in 24 hours.”

These attacks rely on fake messages that the app or service doesn’t actually send. This Office 365 phishing email is an excellent example of that—Microsoft doesn’t actually send you any emails saying your account has been suspended (you WILL get notifications that your credit card has expired).

But cybercriminals are getting better. They’re paying attention to what notifications popular companies do send and duplicating those in phishing attacks. And they’re pretty tricky to spot. Let’s look at this example we were sent recently.

Read More »

The Scary Reality of the Silent Cyberattack

A common saying in the cybersecurity world is “There are two kinds of companies: those that have been breached and those that just don’t know it yet.” The scariest part of this phrase is the “just don’t know it yet.” No breach is good, but at least when you know about it, you can start taking steps to remedy it.

These days, many cybercriminals lie in wait and hide inside of compromised systems, often for months, before making a move.

Read More »

What You Need to Know About Office 365 Before You Buy It

This post was originally written in late 2016. It was edited and updated with new content in early 2018.

Moving your company to the Cloud (or moving between different Cloud services) is no small endeavor. Deciding which service to choose and what plan to go with can require a fair amount of research to make sure you’re getting the best solution for your needs.

One of the most popular options for businesses is Microsoft Office 365. We’ve compiled some of our most popular Office 365 blog posts to help you with your research.

Read More »

Don't Shortchange Technology in Your Small Business

(This article, written by PTG CEO Reed Wilson, originally appeared in the 2017 GSA Book of Experts)

At PTG, we’ve had the benefit of working with small businesses all over the US. While I don’t have empirical data, my hunch is that those who outperform their peers pay attention to three key areas when it comes to technology in their businesses.

 

 

Read More »

Watch Out for These "Secure Email" Phishing Emails

We typically stick to writing about phishing emails and attacks aimed at businesses, but a recent trend has us making an exception. We’ve seen a HUGE uptick recently in a type of phishing emails targeted at individuals: emails posing as an encrypted email notification. Sometimes, these are pretty generic. Sometimes, they’re much more detailed and look like emails about mortgages or title loans.

The scariest part of this trend? These are convincing – some of the most convincing we’ve ever seen. Most have had very few warning signs that they’re a phishing email.

Read More »

Your New Year’s Resolution: Make Cybersecurity a Habit

Happy 2018! For 40% of Americans, the new year means setting a New Year’s Resolution – have you made one? What about for your business? In 2018, we challenge you to make your (business) New Year’s Resolution to take data security seriously. But not just that – we challenge you to make cybersecurity a habit.

Read More »

Our Top Blog Posts of 2017

 2017 is coming to a close, and we’re counting down our top blogs post of the year. Most of these posts weren’t written in 2017, but continue to be our most popular posts.

Not surprisingly, most of these focus on Office 365. We’re happy to see a security-based blog on here! Cybercriminals often target businesses based on the technology they use and knowing the red flags and warning signs to look out for is a huge step in the right direction towards keeping your business secure.

Read More »

5 Ways Outsourcing Your IT Can Help Your Bottom Line

If you don’t currently outsource your technology needs to an IT company, the DIY approach can seem more cost-effective. But outsourcing your IT needs can save you money in the long run, even though you’ll be adding a bill every month.

Here’s how (be sure to check below the infographic for more explanation!):

Read More »

Why Punishment Shouldn’t Be Part of Your Cybersecurity Plan

Picture this: One of your employees downloaded a malicious attachment from an email, and now some of your company’s files are encrypted. Your company has fallen victim to a ransomware attack. What do you do with the employee? If your answer involves punishing the employee, you need to think again, or you could be setting your company up for more attacks in the future.

One of the absolute worst things you can do for your company’s data security is punish employees for falling victim to a cyber attack. Let us repeat that: do not punish your employees for falling victim to a data breach.

Read More »

5 Steps for a Successful Office 365 Migration

One of the best ways to set yourself up for success when moving your business to Office 365 is a seamless migration with no downtime for employees. We've helped hundreds of companies migrate to Office 365 and have picked up some tricks along the way.

Follow these steps for a successful migration:

Read More »
   
Ultimate Guide to Small Business Cyber Security