blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

6 Motivations of Cyber Criminals

Kaitlin Schneider
If you’ve read about recent cyber attacks in the news, you might be wondering why cyber criminals try to hack into other systems and what motivates them.   If you can understand some of their motivations a little more clearly, along with who is most likely to be targeting your specific organization, you can bolster your defenses and be ready for whatever the threat landscape throws your way.  
Read More
Topics: Security Threats, Network Security

Stay Alert to Compromised Credentials with Dark Web Monitoring

Alyssa Sisco
Do you know if your CEO’s email username and password are being sold on the dark web right now? How would you? Eventually, you’ll find out when you have to prevent finance from wiring a hacker - posing as your CEO - large sums of money. Or, you may find out after finance has already fallen for a CEO fraud phishing scam and wired a hacker money… But if there is a way for you to know when your CEO’s credentials are being sold in the first place, you can stop the scam before it even starts. Well, ...
Read More
Topics: Security Threats, Data Breach, Network Security

How Does Artificial Intelligence Impact SMB Cyber Security?

Kaitlin Schneider
To simplify and automate some processes, many fields of business, like marketing and customer service, are taking advantage of artificial intelligence (AI) and machine learning to make their daily work processes easier and smoother.   But there’s another crucial industry that’s heavily impacted by artificial intelligence: cyber security.   With the array of IT security solutions that utilize AI becoming more readily available, you can expect small and medium-sized businesses to have access to ...
Read More
Topics: Security Threats, Network Security

SolarWinds Breach Underscores Need for Vigilant SMB Cyber Security Practices

Kaitlin Schneider
Many cyber security frontrunners and government agencies are calling the SolarWinds breach one of the most sophisticated attacks they have ever witnessed. Its global reach, to organizations of all sizes, stresses the importance of an optimized, layered cyber security strategy.   In today’s post, I’m going to detail what happened in the SolarWinds breach, why it matters and how you can keep your SMB safe from cyber security attacks with the right solutions. 
Read More
Topics: Security Threats, Data Breach, Network Security

Cyber Security Threats to Watch Out for in 2021

Kaitlin Schneider
2020 proved to be a difficult year for many businesses, particularly with regard to IT and cyber security. From managing remote working solutions to ensuring that IT systems were flexible to meet the ongoing uncertainty of the COVID-19 pandemic, business owners have had to make many unforeseen changes. And as the fraught year of 2020 drew to a close, a sophisticated cyberattack on third-party software from Solarwinds, used by companies large and small across the U.S., resulted in numerous ...
Read More
Topics: Security Threats, Network Security

Do I Need a Firewall When Employees Work Remotely?

Joel Havenridge
With more small businesses turning to a remote workforce, protecting business operations and data is crucial. As a business owner, you most likely will need multiple firewalls to provide the necessary security required by remote access. This includes both an on-premise appliance and software that runs on the remote computers your employees use at home.  Evaluating the use and risk of your IT solutions will go a long way in deciding which firewalls you need so you can get the most benefits of ...
Read More
Topics: Equipment Purchases, Network Security

Is Microsoft Teams HIPAA Compliant?

Kaitlin Schneider
Like many other businesses, healthcare organizations continue to search for ways to work with employees and customers through enhanced mobility and collaboration. While working through the cloud provides greater reach and access, connecting online puts these businesses at greater risk for exposure, data leaks and targeted attacks from cyber criminals, particularly if employees are using their own personal devices. And healthcare organizations must remain HIPAA compliant throughout this sharing ...
Read More
Topics: Microsoft Products, Network Security, Health Care

Why Your SMB Should Care about Ransomware

Kaitlin Schneider
2020 has been an unexpected, topsy-turvy year for everyone running a business. From moving to remote models to digital marketing, a lot of businesses are conducting a majority of their business online.   With that digital shift comes more pronounced vulnerabilities to cyber attacks, and one of the most noteworthy tactics criminals have turned to is ransomware. In fact, it is now the most common type of cyber security incident threatening small-midsized businesses.   Read on to learn more about ...
Read More
Topics: Security Threats, Network Security

What Are the Benefits of Firewall Security?

Joel Havenridge
For most small business owners today, running a business effectively and efficiently requires connecting to the internet. Your business systems and software likely process millions of information requests and transfers every day, and each one is an opportunity for cyber criminals to find their way into your network. That’s why it’s essential to have a firewall in place.  Simply put, firewalls keep bad things on one side and good things on the other. The benefits of firewall security run the ...
Read More
Topics: Security Threats, Network Security

4 Network Threats That Can Be Prevented Using a Firewall

Chris Vilim
Cyber security remains a top priority, and an ongoing battle, for all businesses, and a key component in that fight is implementing and maintaining a strong firewall.  The initial concept behind a firewall was to keep the “bad guys” from getting into your network and data systems. And while that goal is still paramount, most firewalls have evolved into server-like platforms that can run different software that serve different purposes.  Through these expanded capabilities, a managed firewall ...
Read More
Topics: Security Threats, Network Security