Home » Blog » Page 2

It’s Official: Your Business NEEDS to Use HTTPS

Https now

You may have noticed many business websites now have a green padlock in the address bar next to the letters ‘https’. Until recently, you’d only see that on shopping or banking sites, but it’s now become the expected norm for all business websites – even if you don’t ask people to log in or enter …

Read more

How to Securely Dispose of Old Computers

Getting tech new business

Getting new computers for your business is exciting, but what happens to the old ones? Depending on the age, some people sell them, others throw them out. That’s the easy part. The problem is the sensitive data on them. There are passwords, account numbers, license keys, customer details, medical information, tax returns, browser history…. the …

Read more

How to Get the Right Tech for Your New Business

Getting tech new business

Congratulations on your new business! Start-up costs can easily escalate, and tech is often one of the bigger expenses. It’s not that everything is high priced, but the sheer number of technologies available can overwhelm smart decision making. The latest tech is dangled in front of you with amazing features you didn’t know you needed, …

Read more

Netgame pfSense® Security Appliances

Netgate pfSense Router

Netgate’s pfSense security appliance solutions provide reliable, scalable systems that are unmatched in value and performance. Because there are no required on-going maintenance or license fees, we provide the lowest total cost of ownership with the most security and connection features in the market today! Affordable. pfSense firewall appliances come with the industry’s lowest total …

Read more

Why Your Business Needs Unified Threat Management

Unified Threat managment

Sounds scary doesn’t it? Almost like a swat team dressed in black is going to swing in and start yelling orders. While just as effective at disabling the bad guys, Unified Threat Management (UTM) is a special kind of IT solution focused on proactive protection. Consider it more like a team of virtual bodyguards that …

Read more

Why Periodic Security Assessments Should Be Your New Normal

By now you know that building up your cyber security is just as important as building up your cash flow. Both are essential to your success, but while most businesses keep an eye on the financials, they tend to think cybersecurity is something they can set and forget. Unfortunately, cybercriminals are constantly coming up with …

Read more

The True and Unexpected Costs of Being Hacked

There are the normal costs everyone associates with a breach, like getting your own server and computers fixed up, with maybe a little downtime. But really, most businesses view the possibility of getting hacked as more of an inconvenience than a bottom-line cost. For those who’ve come out the other side though, it’s a very …

Read more

Fake Invoice Attacks Are on the Rise – Here’s How to Spot (and Beat) Them

Fake Invoice

Businesses around the world are being struck with a cyber-attack that sends victims a fake invoice that looks real enough to fool to most employees. It’s an old scam that used to see bills faxed or mailed in, but it’s made its way into the digital world and instances are on the rise. Chances are …

Read more

3 Essential Steps Before You Fire an Employee

Fire Employee

Your employees need access to your various business accounts so they can do their job, but what happens to those passwords when you fire them? Nobody likes to think of firing their employees, or why you’d need to, but nonetheless, it’s a responsibility every business owner must face at some point. While your accounts team …

Read more