Risk – Part 5: What is a patch…and do I really need to install it?

You have probably seen or heard of software patches or updates. Pretty much every company in some way releases patches. In simple terms, Wikipedia does a great job defining it: a “set of changes to a computer program or its supporting data designed to update, fix, or improve it.” But how does this affect the here and now? If you use a computer, you need to check and make sure that all o...

Keep Reading

Risk – Part 4: Do I really need to enable 2FA or MFA?

You likely have heard the terms 2FA or MFA. Both are thrown around and you’ve probably seen them as an option you can enable in different accounts online. But how do they directly affect you and does it really make a difference? Well, let’s give a scenario and then look into the specifics of MFA. Meet Greg. He is a small business owner and just finished setting up his email with GSui...

Keep Reading

Risk – Part 3: Default Credentials

Today, we’re going to look at a very easy method that businesses and organizations can use to lessen the amount of risk of a cyber attack or a virus “infection.” You may be thinking, “What is it?” Well, one area that is commonly overlooked is ‘default credentials’ for new devices. Default credentials are the administrative logins and passwords that come from the manufacturer w...

Keep Reading

Risk – Part 2: Should I make everyone an administrator?

As we previously discussed in a blog post, “We face risk every day. Some risks we can avoid and others we can’t,” but today, we’re going to talk about one area where you have a little more control and the ability to lessen the overall risk. Let’s start off asking a question... Who has domain administrator access on your business network? This question might seem foreign if you’r...

Keep Reading

You are facing risk! | Cybersecurity and Viruses

RISK: “expose (someone or something valued) to danger, harm, or loss.” (dictionary.com)  We face risk every day. Some risks we can avoid and others we can’t. When we drive a car, we risk a possible accident or maybe getting stranded if the car breaks down. Risk is a fact of life.  As many know, a fountain pen is more prone to leak versus a standard ballpoint pen. If I carry a ...

Keep Reading

Ransomware | What is it, is it current and why should I be concerned?

Many have heard the term ‘ransomware’, but don’t actually understand what it is, how it could affect them, as well as how to protect against it. Ransomware is defined in the dictionary as: “malware planted illegally in a computer or mobile device that disables its operation or access to its data until the owner or operator pays to regain control or access” (dictionary.com). While ...

Keep Reading

NIST Releases Guidance Solutions for PACS Ecosystem

Given how medical providers struggle with ensuring their data is safe, something had to be done to offer guidance. Read this blog about a new cybersecurity plan.   The picture archiving and communication system (PACS) is an ecosystem that stores images that are gathered from medical imaging technology. This ecosystem offers a convenient platform where medical providers can store and access these...

Keep Reading

Want To Drastically Enhance Your Small Business Cybersecurity?

No matter how secure you may be right now, you could always be doing more. Have you double-checked your cybersecurity lately? Review the best practices below to strengthen your small business cybersecurity. When everything is going well, the last thing you want to do is think about what will happen when something goes wrong. It’s not necessary to dwell on the potential for a security disaster th...

Keep Reading

Downtime Is Extremely Expensive – Can You Actually Afford It?

Downtime is bad for business. Whether you agree or not, it’s a fact – just a couple years ago, small businesses with up to 50 million in annual revenue reported that just a single hour of downtime cost them $8,600. Why Does Downtime Cost So Much? The main cost of downtime is not the fix itself, it’s the halt in your business’ productivity. If an IT-related or natural disaster occurs and t...

Keep Reading

Microsoft Excel Experts SWEAR By This…

Businesses nowadays collect an incredible volume of data from various sources, including online sales, in-store-transactions, social media, and various other places. So how do you find value in that data? The simple answer: Organizing it properly within worksheets. Ready to unlock the potential of your data? If you want to analyze and make sense of the information you’re storing, here’s how…...

Keep Reading