Spam Can Be Tricky, So Keep an Eye Out for These Warning Signs

Spam Can Be Tricky, So Keep an Eye Out for These Warning Signs Sometimes, we kind of miss the oh-too-obvious spam emails that were once the norm. You know, the kind that were supposedly from some usurped royal who needed your assistance to reclaim their rightful place on the throne, or from some absurdly attractive […]

Check Links Before You Get Yourself in Trouble with these Link-Checking Tools

Check Links Before You Get Yourself in Trouble with these Link-Checking Tools It’s all well and good for us to recommend that you avoid phishing attacks and infected attachments simply by not clicking on the links in emails and other popular vectors of attacks, but the fact of the matter is that you might need […]

Three Statistics to Help Shape Your Business’ Cybersecurity

Three Statistics to Help Shape Your Business’ Cybersecurity We know it’s not pleasant to think about your organization succumbing to a cybersecurity attack, but it’s a very realistic event that you have to be prepared for. Let’s take a look at the statistics and how exactly they are not in your business’ favor. It helps […]

What Key Things To Look For In A Good Cyber Liability Insurance Policy

What Key Things To Look For In A Good Cyber Liability Insurance Policy As the number of successful cyber attacks continues to grow, so does the need for adequate cyber liability insurance. But what exactly should you look for in a good policy? Here are a few key things to keep in mind. A good […]

Understanding How You Get Malware will Help You Avoid It

Understanding How You Get Malware will Help You Avoid It Malware has plagued anyone using technology for a long time, and while security has certainly gone a long way toward protecting users from malware, so too have the threats grown more powerful and dangerous—especially for businesses. Let’s take a look at some common ways individuals […]

Declining PC Shipments Suggest New Business Computing Models

Declining PC Shipments Suggest New Business Computing Models Building a company’s computing infrastructure is a costly and time-consuming process. Sure, you can purchase new servers; or workstations in bulk, but overall it takes some time to get everything set up and running just how you need it to. PC manufacturers are shipping fewer computers than […]

The Zeppelin Group is Making Us Ramble On About Ransomware

The Zeppelin Group is Making Us Ramble On About Ransomware We apologize for the pun, but we couldn’t help ourselves. When you go about your business and attempt to onboard a new client or implement a new tool for your company, you spend time getting to know what your business is doing and why. Well, […]

How To Spot a Phishing Email

How To Spot a Phishing Email Earlier today I received an email from a contact who works in the private equity field.  I met Rob R. at the AM&AA event in Dallas earlier this summer, and we had a great discussion on the importance of technology due diligence during the acquisition process.  He asked that […]

Business Technology Challenges to Think About

Business Technology Challenges to Think About Business technology is far from the easiest thing to manage, and it’s mostly because managing technology is not the sole focus of companies (unless you’re us, of course). If you can’t overcome your IT challenges, your business could be held back needlessly. Let’s go over some of the common […]

A Vulnerability in Your Windows Calculator?

A Vulnerability in Your Windows Calculator? Sometimes security breaches and hacking attacks come from the most unlikely of sources, even going so far as to utilize trusted applications to infect an endpoint or network. This is the case with a new phishing attack which uses the Calculator application that comes built-in with Windows in a […]