by Linda Cross | Oct 27, 2022 | Business Continuity, Business Wi-Fi, Cloud Services, IT & Email Security, IT Support, Network Assessments
As the world increasingly moves online, so do the risks to our businesses. Cyber insurance is one way to help your business recover following a cyberattack. It covers financial losses caused by events such as data breaches, cyber theft, ransomware and more. Cyber... by Linda Cross | Jul 19, 2022 | Business Continuity, Business Wi-Fi, IT & Email Security, IT Support
“♫ ♪ The Jig is up, the News is out, they Finally found me. The Renegade who had it Made retrieved for a Bounty ♫ ♪” You may not know it but, like the Old West, there is a bounty on you and your data. Spear Phishing is a phishing method targeting specific individuals... by Linda Cross | Mar 17, 2022 | Business Continuity, Business Wi-Fi, Cloud Services, IT & Email Security
Ask not what technology can do for phishing security, ask what YOU can do for phishing prevention! The numbers are in and it’s not pretty. In 2021, the average phishing-based ransomware attack cost businesses $1.85 million and resulted in 7 business days of downtime... by Linda Cross | Jan 11, 2022 | Business Continuity, IT Staffing, IT Support, Uncategorized
As you may be aware, the pandemic has created unprecedented supply chain issues, including within the information technology (IT) sector. It has become difficult to get IT-related items, such as laptops and webcams, into the hands of consumers. The disruption to the... by Linda Cross | May 14, 2020 | Business Continuity, IT & Email Security
If you woke up tomorrow and ran a marathon, how would you fare? It’s highly doubtful that you would successfully run the 26.2 miles without months of exercises, training, and drills. The same is true for disaster recovery (DR): The chance that you could successfully... by Linda Cross | May 14, 2020 | Business Continuity
Recently we have been thinking about how SMBs can better prepare for a power outage, cyber-attack, fire, flood or other disaster. When it comes to protecting your business and sensitive data, you have to think beyond a basic backup schedule and strong passwords....
Recent Comments