Safe Online Shopping: Tips for a Secure Experience

By Byron Martin | November 20, 2023
With Black Friday and Cyber Monday right around the corner, here are some tips for a safe and secure online shopping experience.

4 Things To Do Right Now To Prevent Your Cyber Insurance Claim From Being Denied

By Byron Martin | November 16, 2023
“Thank goodness” is probably what Illinois-based manufacturing company ICS thought about having a cyber insurance policy with Travelers Insurance..

How To Safely Share Passwords With Employees

By Byron Martin | November 6, 2023
If you ask a security professional, you get by-the-book advice about sharing passwords: “Don’t share passwords.” But we know, in reality, that..

Here’s What Google Maps Timeline Knows About You (And It’s More Than You Think)

By Byron Martin | October 30, 2023
It’s 10:00 p.m. – do you know where your children are? Google probably does. Thanks to Google Maps’ Timeline feature, the tech company probably knows..

Staying Cyber-Savvy: Outsmarting Criminals with Regular Software Updates

By Byron Martin | October 19, 2023
36% of survey participants reported installing the latest updates and software as soon as they become available. Of those who reported installing the..

Guardians of the Inbox: How to Recognize and Report Phishing

By Byron Martin | October 16, 2023
72% of respondents reported that they checked to see whether messages were legitimate (i.e. phishing or a scam) compared to 15% who reported not..

Enhance Your Online Security Now with Multifactor Authentication

By Byron Martin | October 10, 2023
In a recent National Cybersecurity Alliance survey, 57% of respondents said they have heard of multifactor authentication (MFA), but many people..

Lock It Down: The Power of Strong Passwords and Password Managers

By Byron Martin | October 5, 2023
Only 33% of individuals create unique passwords for all accounts (NCA)

CISA Kicks Off Cybersecurity Awareness Month With "Secure Our World" Campaign

By Byron Martin | October 2, 2023
October isn't just about falling leaves and pumpkin spice; it's also Cybersecurity Awareness Month, established in 2004 and dedicated to raising..

Improve Your Cybersecurity Awareness

By Byron Martin | September 26, 2023
If you’ve turned on the news sometime during the past few years, you’ve probably heard of more than one instance where a business closed due to a..

Get Ready To Maximize Efficiency With Help From Co-Managed IT Services

By Byron Martin | September 14, 2023
IT services are necessary for every business in the country – IT companies help businesses protect their data, ensure day-to-day operations run..

What Compliance Standards Does Your Business Need To Maintain?

By Byron Martin | August 28, 2023
Compliance standards are some of the most important things a business needs to maintain to be profitable and well-respected while staying out of..

Prepare Your Kids For A Successful School Year: Tech Tips To Maximize Learning Potential

By Byron Martin | August 17, 2023
Back-to-school season has finally arrived, and it won’t be long before our kids are back in the classroom, learning all sorts of different subjects...

Tek Video: The Probability of a Second Breach

By Byron Martin | August 7, 2023
If you've had a breach, statistically the likelihood of you having a second breach or more is very high.

From the Top Down: The Importance of Cybersecurity Leadership in Mitigating Business Risks

By Byron Martin | July 26, 2023
The days when cybersecurity was solely the concern of IT departments are long gone.

Inside OneDrive and SharePoint: The Limitations and Restrictions You Need to Know

By Byron Martin | July 13, 2023
OneDrive and SharePoint in Microsoft 365 are popular cloud-based collaboration, productivity, and file storage solutions to help organizations share..

Shielding Your Cloud: Securing M365 and Google Workspace with SaaS Protection

By Byron Martin | June 20, 2023
Many organizations assume that moving to a cloud-based collaboration app such as Microsoft 365 or Google Workspace means email security and backup is..

Tek Video: Cyber Resilience

By Byron Martin | May 30, 2023
The FBI revealed in its 2022 Internet Crime Report that ransomware gangs breached the networks of at least 860 critical infrastructure organizations..

Tek Video: Top 5 Cybersecurity Musts

By Katrina Wahlbrink | May 25, 2023
Top 5 Cybersecurity Musts. So, what can you do?

The Cybersecurity Divide: Understanding the Cybersecurity Poverty Line

By Byron Martin | May 22, 2023
In today's digital age, cybersecurity has become a critical aspect of every organization's operations. Cyber-attacks can lead to financial losses,..

Tek Video: Cybersecurity Insurance Application Questions

By Byron Martin | May 16, 2023
The cyber insurance market is getting stricter with its application questions and requirements.

Tek Video: The Hacker Timeline

By Byron Martin | May 8, 2023
The average time it takes to identify a breach is 197 days. That's crazy. And then the average time to contain a breach is 69 days.

Tek Video: Myth - My Data is Safe in the Cloud

By Byron Martin | May 4, 2023
Microsoft works off what is called a shared responsibility model. The message is simple, Microsoft is responsible for its cloud, and end-users and ..

Tek Video: Myth - I'm Safe, I Have Current Cybersecurity Tools

By Byron Martin | May 1, 2023
Cybersecurity is much more than the tools.

Tek Video: Myth - I Can Recover from Backups

By Byron Martin | April 24, 2023
So here's the critical thing, the myth. And I touched on it a minute ago.

Tek Video: Social Engineering - Hacking People not Technology

By Byron Martin | March 28, 2023
Hacking people, not technology.

What is a Cybersecurity Tabletop Exercise?

By Byron Martin | March 23, 2023
Have you heard of a cybersecurity tabletop exercise or tabletop drill?

Tek Video: Microsoft 365 Security is a Shared Responsibility

By Byron Martin | March 14, 2023
Microsoft works off what is called a shared responsibility model. The message is simple, Microsoft is responsible for its cloud, and end-users and..

Tek Video: Ransomware as a Service (RaaS)

By Byron Martin | February 28, 2023
Another big, game-changing element of ransomware is that you don't have to be a hacker. You don't even have to have any technical expertise.

Break Free From the Break-fix IT Model

By Byron Martin | February 23, 2023
“If it ain’t broke, don’t fix it.” But is this approach harming your business?

Tek Video: Endpoint Security vs. Antivirus

By Byron Martin | February 15, 2023
Tek Video: Endpoint Security vs. Antivirus

10 Considerations for Hiring In-house IT vs Partnering with an MSP

By Byron Martin | February 13, 2023
10 Considerations for Hiring In-house IT vs Partnering with an MSP Does your business’s IT management need an upgrade?Are you wondering why your..

Why Your IT Provider Should be SOC 2 Accredited

By Byron Martin | January 20, 2023
Why Your IT Provider Should be SOC 2 Accredited A SOC 2 audit isn’t just a one-time exercise. The audit must be completed yearly, inspecting..

Six Ways to Build Cyber Resilience

By Byron Martin | October 10, 2022
83% of small and medium-sized businesses are not financially prepared to recover from a cyberattack.

How to Send an Encrypted Email in Microsoft Outlook

By Byron Martin | July 28, 2022
You’ve probably heard about email encryption and maybe you’ve even wondered when it’s necessary.

How to Transfer Microsoft Authenticator to a New Phone

By Byron Martin | June 2, 2022
Using multi-factor authentication (MFA) is one of the easiest and most successful ways to increase the security for your accounts. This can prevent..