The Tek Blog

Articles for business leaders covering topics such as technology, cybersecurity, and compliance.

Microsoft CSP

3 min read

Benefits of Partnering with a Microsoft CSP

We’ve witnessed a shift in how we work to that of a hybrid workforce, a blended workforce comprising of both remote and in-office work. As such, businesses of all sizes are enabling remote collaboration while keeping their workers and data secure by...

Read More
endpoint security

4 min read

Endpoint Security vs. Antivirus Software

Hackers initiate 2,244 attacks per day. Every link clicked, email opened, app downloaded, and network joined is an opportunity for hackers to...

Read More
SharePoint

1 min read

OneDrive vs. SharePoint. What’s the Difference?

Microsoft announced in its latest quarterly earnings release that the number of Microsoft 365 subscribers has increased to 50.2 million from January...

Read More
information technology

2 min read

Cybersecurity is not Information Technology (IT)

Your cybersecurity has to win every time, but the attacker only needs to win once.

Read More
SaaS Applications

3 min read

Must Have Google Workspace Security Configurations

Migrations to the cloud are moving faster than ever. 78% of businesses will be run almost entirely on SaaS Applications.

Read More
security configurations

4 min read

Must Have Microsoft 365 Security Configurations

1 in 4 businesses reported ransomware attacks on cloud data.

Read More
IoT

4 min read

IoT Medical Device Security

Forbes estimates 646 million IoT devices were used in hospitals, clinics, and medical offices in 2020. The Internet of Things has transformed the way...

Read More
hack

4 min read

Hacked Colonial Pipeline Ransomware Attack Forces Shutdown

The shutdown has caused panic in many southeastern states.

Read More
cybersecurity

3 min read

5 Cybersecurity Questions to Ask Your IT Company

60 percent of small businesses that are victims of a cyber-attack go out of business within six months.

Read More
cybersecurity

6 min read

21 Cybersecurity Horror Stories and Stats!

Cybercrime is the greatest threat to every company in the world. And Most companies take nearly 6 months to detect a data breach, even major ones.

Read More
Microsoft Exchange

5 min read

The Microsoft Exchange Attack Isn’t Going Away Anytime Soon

Estimates put the number of servers compromised by the attack in the hundreds of thousands globally.

Read More
HIPAA

4 min read

HIPAA Breach Notification Rule

642 healthcare data breaches of 500 or more records were reported in 2020, according to HIPAA Journal. That equates to 1.76 data breaches reported...

Read More
microsoft exchange

3 min read

Microsoft Exchange Hack. Patch Now!

Urgent patching necessary. Microsoft continues to see increased attacks targeting unpatched systems by multiple malicious actors beyond Hafnium...

Read More
spear phishing

4 min read

7 Reasons Why Spear Phishing Attacks are Successful

Phishing/social engineering is the #1 cause of data breaches and the primary delivery method for ransomware.

Read More
Spam Email

3 min read

Why You Need Spam Email Filtering

According to Help Net Security, 90% of successful cyberattacks occur through email-based attacks. Additionally, 1 out of every 8 employees shares the...

Read More
technology

1 min read

Technology Doesn't Have to be Frustrating

54 percent of SMBs report the increasing complexity of IT as the main reason for outsourcing their IT. 1 in 4 SMBs lost revenue due to IT-related...

Read More
wind farm

1 min read

Teknologize and Uptime Podcast on IT and Cybersecurity for Wind Farms

Interesting conversation around the IT and Cybersecurity demands of the modern wind farm and the critical technology running behind the scenes....

Read More
Data Breach

2 min read

Data Breach Notifications Laws for Oregon State

What does Oregon law require you to do, and who are you required to notify? What happens if you don’t notify anyone?

Read More
Email Security

1 min read

Email Security: 4 Simple Tips to Keep Your Business Email Secure

There are over 300 million fraudulent sign-in attempts to Microsoft cloud services every day.

Read More
Business Continuity and Downtime

2 min read

Business Continuity: How to Be Prepared for Downtime or an IT Disaster

Flood. Power outage. Cyberattack. Supply chain failure or a disgruntled employee. Disruptions to your business can happen at any moment causing...

Read More
BYOD Mobile Device Management

8 min read

BYOD: Let’s Talk about Mobile Device Management

87% of companies are dependent to some extent on their employee’s ability to access mobile business apps from their personal smartphones. (Source:...

Read More
Data Breach Notification

2 min read

Data Breach Notifications Laws for Washington State

New data breach protections give Washington one of the most robust data breach notification policies in the country.

Read More
Incident Response Email Breach

4 min read

Incident Response: How to Respond to an Email Breach

Business Email Compromise earned hackers $1.3 billion in a year. (Source: Internet Crime Complaint Center)

Read More
healthcare cyber attack

8 min read

The Human Toll of a Healthcare Cyberattack

Vermont hospital cyber attack “Clinics were filled with tears, yelling and anxiety and stress”.

Read More
SolarWinds Supply Chain Breach

2 min read

SolarWinds Orion Supply Chain Breach Update

Roughly 198 organizations, overall, were hacked using the SolarWind backdoor, according to Allan Liska, a threat analyst at Recorded Future. Source:...

Read More
Fiber Internet

1 min read

Affordable Fiber Internet for Business Available Locally

Fiber Internet is Available in the Tri-Cities, WA Did you know that there is fiber-optic Internet available in Benton and Franklin Counties? Our...

Read More
Managed Service Provider

4 min read

Reasons to Use a Managed Service Provider (MSP) for IT Support

66 Percent of Small Businesses Worldwide Have Faced Cyberattacks in The Past Year. For the third year in a row, SMBs are reporting big increases in...

Read More
Sunburst Malware SolarWinds

2 min read

SUNBURST Malware and SolarWinds Supply Chain Breach

As reported approximately 2 weeks ago, the US Government and thousands of public and private sector organizations around the world had their networks...

Read More
SolarWinds Hack

5 min read

Massive SolarWinds Hack Impacting 18,000 Organizations

18,000 organizations have malicious code in their network, and 50 of them have suffered major breaches.

Read More
BEC Scam

3 min read

I Fell Victim to Business Email Compromise. Now What?

The FBI defines Business Email Compromise (BEC) as “a sophisticated scam that targets both businesses and individuals who perform valid...

Read More
Microsoft Teams

2 min read

What's all the Hype? A Quick Glance at Microsoft Teams

Curious about what all the hype is around Microsoft Teams? Microsoft Teams is the ultimate chat-based collaboration app for your organization. A...

Read More
cybersecurity

2 min read

CyberSecurity: Journey, Culture and Strategy

It doesn't have to be a big stress in your life. You can have that peace of mind, but it does take time, attention, planning and strategy...

Read More
incident response

4 min read

Four Steps of an Incident Response Plan

Hackers attack every 39 seconds, on average 2,244 times a day. (University of Maryland) Incidents are cyber events that can include a cyberattack,...

Read More
safe online shopping

1 min read

Stay Safe Online - 5 Tips for Safe Online Shopping

The holiday shopping season is well underway, and many are choosing to shop primarily online due to the COVID-19 Pandemic. Online shopping opens the...

Read More
phishing

4 min read

What is the Definition of Phishing?

phish·ing /ˈfiSHiNG/ noun the practice of using fraudulent e-mails and copies of legitimate websites to extract financial data from computer users...

Read More
endpoint security

2 min read

What's the Difference Between Antivirus and Endpoint Security?

Every endpoint connected to the Internet faces 1.5 attacks per minute. According to a study by the Ponemon Institute, 68% of organizations have...

Read More