Contact Us:

(505) 792-2375

The Top 10 Ways Hackers Get Around Your Firewall and Anti-Virus To Rob You Blind

Cybercrime is at an all-time high, and hackers are setting their sights on small and medium businesses who are “low hanging fruit.” Don’t be their next victim! This report reveals the most common ways that hackers get in and how to protect yourself today. Are You A Sitting Duck? You, the CEO of a small business, are under attack. Right … Read more

April 2018 Cyber Security Tips

network firewall and security

IT Security Tip #66: Routers are $100 at the big-box stores – why do I need a $900 firewall AND pay a maintenance fee? Routers and firewalls can be confusing – they essentially serve the same purpose of distributing Internet to devices on the network. A router like you’d purchase at a big-box store is designed to serve the needs … Read more

June Cyber Security Tips

IT Security Tip #36: Working from home? DON’T! Until you read this… If you plan on catching up on some work from home AND you’re using a personal device such as a smartphone or personal laptop – DON’T! Unless your personal device is monitored by us, you could accidentally introduce a virus to the company’s network. ONLY devices that are … Read more

March IT Security Tips

IT Security Tip #24: How to keep staff from unintentionally causing a security breach With so many access points, from cell phones to laptop and home computers, how can anyone hope to keep their network safe from hackers, viruses and other unintentional security breaches? The answer is not “one thing” but a series of things you have to implement and … Read more

IT Security Tips for February

IT Security Tip #21: 3 rules to keeping your data safe in the cloud If you’re using any kind of cloud application (and these days, who isn’t?), you are right to be concerned about data privacy and security. The company hosting your data is ultimately responsible for keeping hackers out of their network, but most cloud breaches are due to … Read more

client relations cloud computing communication credit cards cyber attacks cyber security data security downloads email email security encryption facebook firewall hacked hardware HIPAA internet phone systems linkedin malware network admin networking network security online banking password password management password security PCI Compliance Personal Device phishing phone systems Public WiFi ransomware sales security security breach social media strong password strong password security successful habits technology time management voice over ip voip work flow work habits