Cybersecurity: A Small Business Guide

You already know that small businesses are particularly vulnerable to cyberattacks, but what can you do about it? How familiar are you with the common security pitfalls for small businesses, and do you know how to avoid them? Check out this article for an overview of the most common types of cyberattacks. It also details…

Read more

The Network in 2020: Faster, Closer, Smarter

It’s no secret that more people, more than ever, are more digitally connected. The underlying network needed to support this connectivity must be faster, closer, and smarter, according to Forbes contributor Steve Alexander.  “On-demand content, bandwidth-hungry mobile apps, IoT devices, and new cloud-based applications are driving the need for more bandwidth and network capacity,” Alexander writes.…

Read more

What is Ransomware?

Ransomware is a form of software that is created with malicious intent and puts user’s files into code. It works by using file encryption, one of the most crucial tools in computer security, and is so common that we tend to think that it was always with us. However, it was only 30 years ago…

Read more
Veeam How to Backup Your Laptop

How (and Why) to Backup Your Laptop

There’s a good rule of thumb in business (and in life)—we all should “hope for the best, but prepare for the worst”. This is especially important where technology, devices, and data are concerned. Our partner, Veeam, explains how a revised version of the 3-2-1 Rule—the 3-2-1-1-0 Backup Zip Code—can help prevent critical data loss. Learn…

Read more
Overcoming Digital Transformation Challenges with Veeam

Overcoming Digital Transformation Challenges

Digital Transformation (DX) remains the #1 driver for business growth in all organizations. In fact, according to our partners at Veeam, 75% of all CEOs believe that Digital Transformation is the #1 activity to drive top-line revenue growth. But what’s affecting the pace of Digital Transformation? Even with the benefits that come along with DX,…

Read more
AppRiver Emotet Trojan

Emotet Botnets Resume Malware Campaigns

Our partner, AppRiver, has been monitoring this particular threat group since 2014. Emotet is a modular banking Trojan that relies on heavy obfuscation and evasion techniques while committing financial theft. The Trojan spreads itself throughout the network by making use of its worm spreader module and brute forcing attacks within the network. The primary method Emotet uses…

Read more

Forms and Surveys Targeted in Living Off the Land (LOtL) Attacks

Living off the land (LOtL) attacks—where hackers use tools or features that already exist in a target environment—have been increasing in recent years. Our partner, AppRiver, has identified that form and survey providers are at the top of the list of legitimate services that these hackers exploit, including Google Forms, Microsoft Forms, SurveyGizmo Surveys, and…

Read more

What is Business Continuity?

All businesses have experienced and continue to undergo change this year. Economic uncertainty, instant remote workforce, and new challenges have meant that our business process may also need to adapt. Business Continuity—keeping the core priority systems of the business available—has also evolved. This article discusses how to address the fact that your previous list of…

Read more

The End is Here

In our May 2019 Insight we went in-depth into what Windows 7 End-of-Life means for your business.  Six month later and with only 2 months left we felt it was once again important to cover this topic.  While Microsoft has made it clear for some time now that the official end of support for Windows…

Read more

Windows 7 End-of-Life: What it means for your business

The End is Near As you may know, Windows 7 is scheduled for its official end-of-life on January 14, 2020. What you might not know is that mainstream support, i.e. feature updates and non-security or critical patches, ended in January 2015. Despite this, Windows 7 is still very heavily used in businesses and as of…

Read more