The Tek Blog

Articles for business leaders covering topics such as technology, cybersecurity, and compliance.

Email Security

1 min read

Email Security: 4 Simple Tips to Keep Your Business Email Secure

There are over 300 million fraudulent sign-in attempts to Microsoft cloud services every day.

Read More
Business Continuity and Downtime

2 min read

Business Continuity: How to Be Prepared for Downtime or an IT Disaster

Flood. Power outage. Cyberattack. Supply chain failure or a disgruntled employee. Disruptions to your business can happen at any moment causing...

Read More
BYOD Mobile Device Management

8 min read

BYOD: Let’s Talk about Mobile Device Management

87% of companies are dependent to some extent on their employee’s ability to access mobile business apps from their personal smartphones. (Source:...

Read More
Data Breach Notification

2 min read

Data Breach Notifications Laws for Washington State

New data breach protections give Washington one of the most robust data breach notification policies in the country.

Read More
Incident Response Email Breach

4 min read

Incident Response: How to Respond to an Email Breach

Business Email Compromise earned hackers $1.3 billion in a year. (Source: Internet Crime Complaint Center)

Read More
healthcare cyber attack

8 min read

The Human Toll of a Healthcare Cyberattack

Vermont hospital cyber attack “Clinics were filled with tears, yelling and anxiety and stress”.

Read More
SolarWinds Supply Chain Breach

2 min read

SolarWinds Orion Supply Chain Breach Update

Roughly 198 organizations, overall, were hacked using the SolarWind backdoor, according to Allan Liska, a threat analyst at Recorded Future. Source:...

Read More
Fiber Internet

1 min read

Affordable Fiber Internet for Business Available Locally

Fiber Internet is Available in the Tri-Cities, WA Did you know that there is fiber-optic Internet available in Benton and Franklin Counties? Our...

Read More
Managed Service Provider

4 min read

Reasons to Use a Managed Service Provider (MSP) for IT Support

66 Percent of Small Businesses Worldwide Have Faced Cyberattacks in The Past Year. For the third year in a row, SMBs are reporting big increases in...

Read More
Sunburst Malware SolarWinds

2 min read

SUNBURST Malware and SolarWinds Supply Chain Breach

As reported approximately 2 weeks ago, the US Government and thousands of public and private sector organizations around the world had their networks...

Read More
SolarWinds Hack

5 min read

Massive SolarWinds Hack Impacting 18,000 Organizations

18,000 organizations have malicious code in their network, and 50 of them have suffered major breaches.

Read More
BEC Scam

3 min read

I Fell Victim to Business Email Compromise. Now What?

The FBI defines Business Email Compromise (BEC) as “a sophisticated scam that targets both businesses and individuals who perform valid...

Read More
Microsoft Teams

2 min read

What's all the Hype? A Quick Glance at Microsoft Teams

Curious about what all the hype is around Microsoft Teams? Microsoft Teams is the ultimate chat-based collaboration app for your organization. A...

Read More
cybersecurity

2 min read

CyberSecurity: Journey, Culture and Strategy

It doesn't have to be a big stress in your life. You can have that peace of mind, but it does take time, attention, planning and strategy...

Read More
incident response

4 min read

Four Steps of an Incident Response Plan

Hackers attack every 39 seconds, on average 2,244 times a day. (University of Maryland) Incidents are cyber events that can include a cyberattack,...

Read More
safe online shopping

1 min read

Stay Safe Online - 5 Tips for Safe Online Shopping

The holiday shopping season is well underway, and many are choosing to shop primarily online due to the COVID-19 Pandemic. Online shopping opens the...

Read More
phishing

4 min read

What is the Definition of Phishing?

phish·ing /ˈfiSHiNG/ noun the practice of using fraudulent e-mails and copies of legitimate websites to extract financial data from computer users...

Read More
endpoint security

2 min read

What's the Difference Between Antivirus and Endpoint Security?

Every endpoint connected to the Internet faces 1.5 attacks per minute. According to a study by the Ponemon Institute, 68% of organizations have...

Read More
password security

2 min read

10 Tips for Better Password Security

81% of data breaches are caused by compromised, weak, and reused passwords. Password security is a key to keeping your information safe on the web.

Read More
email phishing

1 min read

Local Businesses Falling Prey to Phishing Email!

Teknologize has recently seen a major uptick in email-based cyberattacks happening right now and right here in our own backyard.

Read More
Cyber Attacks Target Healthcare

2 min read

FBI Warns Imminent Cyber Attacks Threatening Healthcare

In a joint alert, Wednesday October 28th, 2020 from the FBI, DHS, and the Cybersecurity and Infrastructure Security Agency states “credible...

Read More
Windows 10 Download

2 min read

Upgrade Today: Windows 10 Download Instructions

Windows 7 users who don't upgrade to Windows 10 will no longer be able to get Microsoft's security updates or technical support, leaving your...

Read More
Business Email Compromise (BEC)

3 min read

Business Email Compromise (BEC) & Wire Fraud

Also known as CEO Fraud. Listen to CEO, Byron Martin, explain how hackers can get access to your email and what to be aware of. This is a billion...

Read More
cybersecurity

2 min read

Top 4 Cybersecurity Basics to Implement Now

October is National Cybersecurity Awareness Month. Instituted by the Department of Homeland Security in 2016, this month is a time where we want to...

Read More
Voice-over-IP, VoIP

2 min read

6 Benefits of VoIP for the Work From Home Workforce

The world has been transitioning to remote working for years, but the arrival of COVID-19 has certainly sped that up. VoIP calls are routed over the...

Read More
Zelle vs Venmo

1 min read

Watch out for Zelle Scams...

The Zelle app is a person-to-person transfer app that allows for easy payments straight from a user’s bank account, similar to Venmo or PayPal,...

Read More
Phishing test statistics

How Many Employees Fail an Email Phishing Security Test?

Stats show that 30% of your employees will fail, and fall for a fake email, and potentially get you ransomware.

Read More
Juice Jacking

1 min read

5 Ways to Protect Your Mobile Phone from Juice-Jacking

We’ve all been there. You’re in the airport and need to quickly charge your phone before you jump on your plane. Fortunately, airports now have...

Read More
multi-factor authentication

2 min read

What is Multifactor Authentication (MFA)?

"Only 11% of enterprise users make use of those tools (Speaking of MFA). That means a staggering 89% of accounts remain open to fairly simple...

Read More
Home Internet

5 min read

Work from Home (WFH) Slowing Down your Home Internet?

Does your home internet feel slower, less reliable, than it was, just last year? Are your once smooth, HD movies now looking pixelated and choppy?...

Read More
Security Awareness Training

3 min read

What is Security Awareness Training?

92% of all breaches could have been prevented with a Security Awareness Training program. Security Awareness Training is a means to educate and train...

Read More
Business Email Compromise, CEO Fraud

4 min read

What is Business Email Compromise (BEC) aka CEO Fraud?

More than 30,700 organizations were targeted in the first quarter of 2020 with Business Email Compromise attacks.

Read More

4 min read

Why Co-Managed IT is the Best of Both Worlds

Today’s IT professional has so much more on their plate than ever before. “IT infrastructure leaders often feel that they’re constantly in catch-up...

Read More

2 min read

Work from Home - 4 Ways to Stay Secure

Since the onset of the COVID-19 pandemic, many companies have spent the last few months scrambling to get their staff properly set up for remote work.

Read More
MDR Shield

2 min read

What is Managed Detection and Response (MDR)?

The Average Time it takes to identify a data breach is 197 days. The average time it takes to contain a breach is 69 days. With the volume of cyber...

Read More
Ransomware Attack via Phishing

4 min read

What is Ransomware?

The average ransom paid by a victim, increased by 60%, rising from $111,605 to $178,254 - according to a recent report from Coveware, comparing the...

Read More