Business IT Support Resources

Video Trainings & Webinars

Crash Course & Tech Tips: IT Resources

Featured Blogs

Zero Day Attack

What is a zero day attack?

A zero day attack is a cyber attack that takes advantage of an unknown or unpatched vulnerability for the first time. This could mean that the vulnerability is completely new and that no one was aware of it previously. Or, it could mean that the vulnerability was known, but there was no known way to…

File Sharing Dangers and Best Practices

Best Practices to Avoid File Sharing Dangers

File sharing has long been a way to socialize with friends and family, especially sharing a photo of a sweet moment or memory. Everyone does it, whether on social media, through cloud platforms like Google photos, by email or even a text message. But sharing can give cyber criminals a key to your data: If…

Matanbuchus Malware Attack Uses Google Drive

Matanbuchus Malware Uses Google Drive Link in Phishing Attack

Matanbuchus Malware Uses Google Drive Link in Phishing Attack You’ve probably never heard of Matanbuchus malware but you need to know about it and how it is using Google Drive and other legitimate infrastures to worm its way into your network. This cyber security risk first surfaced in February 2021, but recently, a cyber criminal…

Shared Responsibility Model MS 365 Security

The Shared Responsibility Model & Microsoft 365

The shared responsibility model. You may have heard of it, but do you know what it is or what it means for your business? Before we jump in, there are a few things that you need to understand about your cyber security.  With more and more businesses using cloud services like Microsoft 365 (MS 365),…

How to stop unwanted emails.

How To Stop Unwanted Emails

We all receive those pesky spam emails that crowd your inbox and make it difficult to organize. They can be newsletters from companies you may have signed up for and no longer want, spam mail, or even phishing emails sent by scammers trying to access your information. No matter the type, you can stop unwanted…

Improve Phishing Detection With The SLAM Technique

Prevent Phishing With The SLAM Technique

Phishing has become the top method cyber criminals use to attack companies, whether that’s hitting them with ransomware, breaching their databases,  stealing their credentials and more. It is one of the biggest cyber security threats to companies, so it’s crucial they learn methods of phishing detection.  What is Phishing? Phishing is a social engineering tactic…

Request a SCAP Compliant Vulnerability Assessment

Our advanced, non-invasive internal and external scans can identify security, performance and stability issues in your network. Get a preliminary scan followed by in-depth consultation with our technical and compliance specialists. After some time to consider the findings, we'll run another round of scans and consultations before providing the final report.