Contact Us:

(505) 792-2375

The Top 10 Ways Hackers Get Around Your Firewall and Anti-Virus To Rob You Blind

Cybercrime is at an all-time high, and hackers are setting their sights on small and medium businesses who are “low hanging fruit.” Don’t be their next victim! This report reveals the most common ways that hackers get in and how to protect yourself today. Are You A Sitting Duck? You, the CEO of a small business, are under attack. Right … Read more

August Cyber Security Tips

IT Security Tip #44: REMOVE that unwanted freeware Like it or not, PC manufacturers LOVE to stuff your brand-new PC full of “free” applications (they get paid to do it, so you’ve got a slim chance of getting one without a side of spamware). But clutter is the enemy of a speedy PC, and if you’re not using a particular … Read more

June Cyber Security Tips

IT Security Tip #36: Working from home? DON’T! Until you read this… If you plan on catching up on some work from home AND you’re using a personal device such as a smartphone or personal laptop – DON’T! Unless your personal device is monitored by us, you could accidentally introduce a virus to the company’s network. ONLY devices that are … Read more

IT Security Tips for December

IT Security Tip #15: Set up bank alerts – NOW! Here’s a tip that just might save your bacon: set up withdrawal alerts on your bank accounts. Many banks will send you an e-mail alert whenever money is withdrawn from your account via check, debit card or transfer. Setting up those alerts will allow you to spot and report fraudulent … Read more

Employees Keeping Your Data Safe? Don’t Count On It

In fact, your employees are probably compromising your data right now and aren’t even aware of it. In case you haven’t read the reports, a statement from one of the many companies recently forced to close its doors following a cyber-attack involving one of their own employees brings the point home: “Code Spaces will not be able to operate beyond … Read more

client relations cloud computing communication credit cards cyber attacks cyber security data security downloads email email security encryption facebook firewall hacked hardware HIPAA internet phone systems linkedin malware network admin networking network security online banking password password management password security PCI Compliance Personal Device phishing phone systems Public WiFi ransomware sales security security breach social media strong password strong password security successful habits technology time management voice over ip voip work flow work habits