Blog / Reports / Resources
San Diego School District Data Breaches Strikes Over 500,000 Students
In October of 2018, the San Diego Unified School District in California — the state’s second-largest school district — became aware of a severe data breach. As of now, the hackers are unknown, but officials are aware that through criminal means, the hackers were able...
2019 Accountant’s Guide to Preventing Technology Headaches
Downtime, compromised data, security breaches, and slow-running technology cause big headaches for today’s accountants. After all, you need your technology, and when it’s not working, every hour that goes by costs your firm money. You can’t afford to sit idle—when...
SCAM ALERT: Google Play Gift Cards
If there’s a will there’s a way when it comes to scammers, especially with gift cards. Everyone loves gift cards. Consumers love how easy it is to purchase gift cards, use gift cards and even give gift cards. It’s as simple as buying a card at a...
World Braille Day
On January 4th, 1809, Louis Braille was born. Louis Braille was a child who lost his vision in an incident involving a sharp tool at the age of 3. During his early life, Louis had an interest in “night writing”, a military code used by the French Army in the 1800s....
New Distracted Laws In Ontario – You Better Read This!
You are driving along and you glance down at your smartwatch. Imagine the horror of it when you hear the sirens wail directly afterward — but you think that can’t be for you: you were not driving over the speed limit. But it can be for you. The police saw you...
What Are The Top Cybersecurity Predictions For 2019?
There was something of a cultural shift in the technology sector during 2018 that will undoubtedly impact 2019. Up until last year, cybersecurity issues seemed to predominately plague significant corporations and organizations. The Democratic National Committee hack...
Should Your Business Upgrade It’s Website To WordPress 5.0.2
Only a few short weeks ago, we wrote about the introduction of WordPress 5.0 in early December and discussed whether or not your company should upgrade now, never or at a later date. Our recommendation was to wait until some of the bugs had been worked out of the...
South Carolina Insurers Must Protect Client Data
In April of 2018, South Carolina became the first state in the nation to require insurance companies to establish data security standards to protect consumers from the consequences of cyber attacks. The legislation named the Insurance Data Security Act, also put...
The 2019 Cyber Security Guide For Financial Professionals
The securities industry has been as vulnerable to cyber attacks in 2018 as any other industry. According to the SEC’s Enforcement Division newly created Cyber Unit (formed in 2017 to enhance the ability of the Commission to identify and investigate all cyber-related...
Have You Heard Of This Scam Targeting Amazon Shoppers?
Amazon is a gigantic player in online sales. It’s estimated that the Seattle-based online e-commerce site will be responsible for roughly 50% of all digital sales during the 2018 holiday season, one of the busiest shopping times of the year in the United States. In...
5 Extremely Important Facts Every Small Business Owner Needs To Know About Managed IT Services
As small business owners rely on IT more than ever before, a growing number are turning to managed service providers to obtain the high-tech IT infrastructure, software and assistance they need to be successful. At the same time, there are many entrepreneurs and small...
How Automation Will Change New Jersey’s Economy
Technology is changing the face of almost every industry, and anyone who can’t keep up will be left behind. The United States has far more STEM jobs than qualified applicants to fill them, with the need growing steadily. Just in 2016, there were about 3 million...
What Is The Microsoft 365 Freelance Toolkit
Companies today are increasingly relying on freelancers to support one-time or ongoing projects. The growing need for freelance support can create complex challenges for companies. How, for example, can companies manage projects across time zones? How can freelance...
Australian Federal Police Share Top Tips To Keep Kids Safe Online
Staying safe online is important for everyone, but especially for kids. Kids are the most vulnerable population online right now. They do not have the life experience to understand when someone is trying to use, exploit, or groom them. At the same time, they are...
Are Bitcoin Bomb Threats A Serious Security Threat?
Users around the world have been receiving bitcoin extortion emails for a long time, one of the most notorious being a “sextortion” threat to show a computer-eye view of you watching adult videos to the world. The latest threat is more alarming: the sender...
How Can Local Companies Best Use Outsourced IT Services?
Outsourcing IT services involves hiring third-party IT companies or specialists to handle IT-related tasks. A growing number of companies are opting to outsource their IT department to experts who can fully focus on a company’s IT needs while company employees...
Have You Made Up Your Mind Regarding Your 2019 Technology Plan?
December 31st is Make Up Your Mind Day As New Year’s Eve approaches, it’s time to remember its other name: Make Up Your Mind Day. As the last day of the business year for most companies, it’s also a vital point for putting your plans for the next...
How To Make Your Presentations Rock With Live Captions & Subtitles in PowerPoint
PowerPoint is regaining a much-needed edge in the world of business presentations. Microsoft recently announced some new exciting and easy to use features that will improve presentation design for those who subscribe to Office 365 and who have PowerPoint 2016 or...
5 Tips To Boost The Performance Of Your Business WiFi Network
It’s difficult to imagine a modern business that doesn’t have Wi-Fi. The internet is one of the most powerful tools in the world right now, and every level of every business typically needs it on demand. For most business locations, that access is determined by the...
How To Combat Cybercrime On A Small Business Budget?
If there’s one thing that most small businesses have in common, it’s a limited budget to invest in infrastructure. Yet failing to devote any resources to securing your technology can put the company itself at risk. Understanding the specific ways that small businesses...
Cyberthugs Have Made $4 Million So Far in Email Sextrotion
Not every internet scam needs sophisticated software to put into action. In fact, one of the most successful ones going on right now is incredibly simple in operation, while being quite sophisticated in its psychological tactics. It is the psychology of it that gets...
Phishing Emails: Why They’re a Threat & How to Protect Your Business
It is a scary fact that one out of every three business employees will open a phishing email at work on any given day. Phishing emails are created explicitly by hackers to try and convince you to give up pertinent information about your business or inadvertently make...
Homeland Security Has Some Great Cybersecurity Resources
If you own or manage a small business, you’re undoubtedly concerned about how to keep your customers’ personal and your business’ proprietary and financial information secure. While you may not think that you have much to steal, since you are a small...
Canadian Data Breaches: Changes to the Laws Occurred on November 1st, 2018
Many business owners don’t realize that new laws are in place surrounding data breaches. On November 1st, 2018, these new laws went into effect for all Canadian business owners. These laws will affect thousands of businesses now, so it’s essential for all business...
Is Your 2019 Business Technology Plan Completed?
The new year is already upon us, but it is not too late to put together a solid, sensible information technology plan for 2019. Strategic planning in all areas of operation—including technology—helps organizations budget for and efficiently manage day-to-day...
Anthem Reveals More About Data Breach and Warns of Phishing Scam
Data breaches and phishing scams are becoming more popular among cybercriminals. There have been so many data breaches, in fact, that the chances that some of your private information has been discovered by online scammers and sold to other ones are pretty high. One...
Top Concerns CISOs Face With Cybersecurity In 2019
Chief information security officers face new and stronger threats to systems in 2019. Not only are hackers deploying more sophisticated attacks, but attackers have new targets in their sights. Also, geopolitics and consumers will continue to play an outsized role in...
What Is the Difference Between Managed Services and Break/Fix IT Services?
Computer systems have a way of breaking at the worst possible time: in the middle of your business’s rush season, right before a long weekend or when your regular IT technicians are on vacation. When this happens, many organizations call a repair service,...
Ransomware Impacts Dental Professionals Too…
Most of the time, a five-day vacation is something to look forward to, but if that vacation is unplanned and filled with anxiety over when you can get back to work, it’s probably not much of a holiday. It becomes a burden; financially, emotionally and even...
What Is The Difference Between Computer Repair and Computer Support Companies?
When computers or network systems break, you need to know that you’re able to quickly get your teams back online and to full productivity. That can be a challenge, especially if you’re working with a computer repair company. You can’t predict when a...
What Is The Difference Between Help Desk Services & Desktop Computer Support?
In searching for the ideal outsourced IT support company for your business, you may have come across some technical terms and phrases. Many of them are probably phrases you’ve heard before; however, you may not be sure of their precise technical meaning within the IT...
Better Online Security During the Back-to-School Season
It’s almost time for kids to go back to school. In addition to buying new clothes and shoes, have you also thought about ways to keep kids safe online? If they have computers with Windows 10, Xbox One devices, or Android phones running Microsoft Launcher, families can...
10 Tips To Guard Against SamSam Ransomware
In July 2018, an article published by Naked Security stated that SamSam, one of the latest ransomware threats, has been one of the most costly and dangerous attacks in history. SamSam leeched at least $6 million from unwitting victims, some of which were well-known...
Amazon Now Into Healthcare?
Is Amazon Getting Into Healthcare? Amazon has already gotten into healthcare. The world’s largest internet company and third-largest retailer announced in January that it was forming an independent healthcare company for its own employees and the employees of...
Why Business Must Have A Security Focused IT Consulting Company
When you are choosing the best IT consulting for your business, it is critical that you find a company that is extremely focused on all of the elements of security that can be a threat. Many of the best IT consulting companies go the extra mile for their clients by...
Keeping Your Kids and Family Safe Over the Holidays
“Tis the season, and you’re looking forward to spending the holidays with your family. During this festive time of year, you and your family are making memories to last a lifetime. By taking a few precautions, you can increase the odds that the holidays are a safe and...
How Will Artificial Intelligence Work In Healthcare?
When it comes to artificial intelligence (AI), it seems that no matter the environment, there are always two parties: staunch defenders and unconvinced skeptics. And to be sure, any new technology carries the same burden — Do the benefits outweigh the potential...
Critical Questions CEO’s Need To Ask When Evaluating Cyber Security Risks
The number of cyber attacks has continued to increase exponentially. In fact, the FBI reported that since January 1, 2016, the number of cyber attacks using ransomware has risen to more than 4,000 daily attacks. Evolving technology and an increasing dependence on...
WordPress Fixes Security Issues With 5.0.1 Release
In the first week of December 2018, WordPress announced the release of its much-awaited update WordPress 5.0. Researchers testing the new version almost immediately found several serious security issues which jeopardized sensitive personal data like user email...
Have You Heard Of The Maryland Cyber Security Tax Credit?
Protecting data and information systems is a priority for nearly every type of business and organization. The state of Maryland has recently stepped up to support businesses by passing a bill that enables small businesses to invest in security technologies while...