How are you planning for 2020?

Brett Harney Application Integration, Cloud, Collaboration, Communication, Managed Network Services, Network Security, Unified Communications

With not only a new year but a new decade right around the corner, company leaders need to be mapping out a serious plan for what’s ahead. But where do you start? It’s a major challenge in deciding when ‘outdated technology’ is holding an organization back, or when it’s still delivering value. Or determining if the ROI for building integrations …

Say Goodbye to Microsoft’s Windows 7

Brett Harney Application Performance, Network Performance, Network Security

On January 14, 2020 — Microsoft’s support for Windows 7 will cease. That means no more updates or fixes, including security fixes after January 14. What does end of support mean? If you continue to use Windows 7 after support has ended, your PC may become more vulnerable to security risks and viruses. Your PC will continue to start and …

With cybersecurity scams around every corner – can you afford to wait?

Brett Harney Network Security

Unless you’ve been living off the grid, you’ve probably heard about the exploding number of cybersecurity threats popping up everywhere. And it’s not just global statistics we’re talking about. Even state and local governments are coming under assault. Baltimore is the latest US city targeted with a ransomware attack, following smaller security beaches in towns like Greenville, NC, and Allentown, …

Spoofing

Spoofing: an easy way to get hacked

Brett Harney Business Continuity / Disaster Recovery

The first thing you want to do is determine whether your account has been compromised by a virus, malware, or a spammer, or if you are just being spoofed. Email spoofing is when the sender of an email, typically spam, forges (spoofs) the email header “From” address so the email being sent appears to have been sent from a legitimate …

cybersecurity

Understanding Cyber Threats: How Your Company Is at Risk Today & How to Protect It

Brett Harney Network Security

It can seem so legitimate. You get an email from a service you use asking you to change your password. You click on the link, which takes you to a website that looks authentic. You input your current login credentials and suggest a new password. Success! It says you’re done. But you’re not done. In fact, you haven’t achieved what …