Contact Us:

(505) 792-2375

The Top 10 Ways Hackers Get Around Your Firewall and Anti-Virus To Rob You Blind

Cybercrime is at an all-time high, and hackers are setting their sights on small and medium businesses who are “low hanging fruit.” Don’t be their next victim! This report reveals the most common ways that hackers get in and how to protect yourself today. Are You A Sitting Duck? You, the CEO of a small business, are under attack. Right … Read more

July Cyber Security Tips

IT Security Tip #41: Never use PERSONAL devices to connect to COMPANY data You’re a hardworking team player who likes to check e-mail and get a few things done after hours – all good! But here’s something you might not know: you should never access company data, file servers or applications through personal devices and home PCs that are not … Read more

June Cyber Security Tips

IT Security Tip #36: Working from home? DON’T! Until you read this… If you plan on catching up on some work from home AND you’re using a personal device such as a smartphone or personal laptop – DON’T! Unless your personal device is monitored by us, you could accidentally introduce a virus to the company’s network. ONLY devices that are … Read more

May Cyber Security Tips

IT Security Tip #33: Physical security matters! In a recent incident reported in US news, an office secretary unknowingly gave some of her law firm’s most private data to a gentleman who had bought a Comcast Cable polo shirt off eBay. He dressed in khakis with a tool belt, and told the secretary he was there to audit their cable … Read more

March IT Security Tips

IT Security Tip #24: How to keep staff from unintentionally causing a security breach With so many access points, from cell phones to laptop and home computers, how can anyone hope to keep their network safe from hackers, viruses and other unintentional security breaches? The answer is not “one thing” but a series of things you have to implement and … Read more

client relations cloud computing communication credit cards cyber attacks cyber security data security downloads email email security encryption facebook firewall hacked hardware HIPAA internet phone systems linkedin malware network admin networking network security online banking password password management password security PCI Compliance Personal Device phishing phone systems Public WiFi ransomware sales security security breach social media strong password strong password security successful habits technology time management voice over ip voip work flow work habits