Contact Us:

(505) 792-2375

The Top 10 Ways Hackers Get Around Your Firewall and Anti-Virus To Rob You Blind

Cybercrime is at an all-time high, and hackers are setting their sights on small and medium businesses who are “low hanging fruit.” Don’t be their next victim! This report reveals the most common ways that hackers get in and how to protect yourself today. Are You A Sitting Duck? You, the CEO of a small business, are under attack. Right … Read more

April 2018 Cyber Security Tips

network firewall and security

IT Security Tip #66: Routers are $100 at the big-box stores – why do I need a $900 firewall AND pay a maintenance fee? Routers and firewalls can be confusing – they essentially serve the same purpose of distributing Internet to devices on the network. A router like you’d purchase at a big-box store is designed to serve the needs … Read more

February 2018 Cyber Security Tips

protect your business from spam and phishing attacks

IT Security Tip #61: Start with the basics! You’ve heard the advice countless times before: you must have antivirus software and a strong firewall. However, in this day and age, there is more to the security “basics” than a solid firewall. What about the employee who inadvertently clicks on an e-mail on her phone from a foreign ambassador trying to … Read more

November Cyber Security Tips

IT Security Tip #55: 3 rules to keeping your data safe in the cloud If you’re using any kind of cloud application (and these days, who isn’t?), you are right to be concerned about data privacy and security. The company hosting your data is ultimately responsible for keeping hackers out of THEIR network, but most cloud breaches are due to … Read more

October Cyber Security Tips

IT Security Tip #51: Don’t just close your browser! When online accessing a banking site or any other application containing sensitive data, make sure you log out of the site and THEN close your browser. If you simply close your browser, some of the session information that a hacker can use to gain entry is still running in the background. … Read more

client relations cloud computing communication credit cards cyber attacks cyber security data security downloads email email security encryption facebook firewall hacked hardware HIPAA internet phone systems linkedin malware network admin networking network security online banking password password management password security PCI Compliance Personal Device phishing phone systems Public WiFi ransomware sales security security breach social media strong password strong password security successful habits technology time management voice over ip voip work flow work habits