Blog

Answering your questions about security, strategy, cloud, budgeting, service, culture, and more.

Windows 7 End of Life: What Your Business Needs to Know (and Do)

As you’ve probably (hopefully) heard by now, Microsoft will be ending support for Windows 7 as of January 14, 2020. For the past three decades we’ve managed technology systems for small and mid-sized law firms and associations in the DC Metro area. Over...
Read More

The Anatomy of Comprehensive Ransomware Protection

What will it take the city of Baltimore to recover from its recent ransomware attack? Over $18 million. Atlanta won’t be surprised: it cost $17 million for them to recover from their attack last year. There’s a reason we keep seeing more and more about...
Read More

Top 3 Technology Items Executives Must Consider

What one tool directly influences your business’s ability to attract and retain top talent, minimize risk, and gain competitive advantages? Your technology. While many executives are tempted to stay out of their IT altogether, we’ve reached a point in...
Read More

Top 10 Tips to Avoid Social Engineering Hacks

Did you know that 95% of all successful cyberattacks begin with a phishing scam? And that’s just one type of social engineering, a hacking method that puts us, our families, and our businesses at risk on a daily basis. The unfortunate truth is that our...
Read More

The Dangers of Online Shopping and How to Stay Safe [Video/Infographic]

This past Cyber Monday, consumers spent nearly $8 billion online, with over 54% of purchases made directly from smartphones. Two days prior, on Black Friday, online sales surpassed $6 billion. The holidays are, of course, prime time for purchases in...
Read More

What is "Vishing" and How Can You Stay Protected?

Previously we’ve published several articles about email phishing scams and how to best avoid them. We even put together an infographic on the Top 5 Phishing Red Flags, which you can take a look at here. What we haven’t yet discussed is a different kind...
Read More

Top 5 Phishing Red Flags (Infographic)

Did you know that 95% of successful cyberattacks begin with a phishing scam?   “Phishing” is an umbrella term used to describe an email scam where the sender tries to trick you into handing over valuable information such as account credentials, banking...
Read More

Key Elements of a Successful Security Awareness Training Program

Over the past 25 years our company has seen cyber threats evolve in a nasty way. Last year a startling 4,000 ransomware attacks occurred every day. One out of every 131 emails sent was malicious. Businesses with fewer than 1,000 employees now have a 90%...
Read More

Top Cybersecurity Stats Every Executive Should Know for 2018

As we make our way into 2018, one of the questions we’re hearing from our clients is this: how can we expect the cybersecurity landscape to change, and what will this mean for our business?   Unfortunately, recent data indicates that cyberattacks will...
Read More

How to Choose the Right Cyber Liability Insurance Plan for Business

Not long ago we published an article that discusses what cyber liability insurance is, what it covers, what it doesn’t, and whether or not it might make sense for your business to invest in. In this piece, we touched briefly on the matter of working with...
Read More