Teknologize Blog

Articles for business leaders covering topics such as technology, cybersecurity, and compliance.

Zelle vs Venmo

1 min read

Watch out for Zelle Scams...

The Zelle app is a person-to-person transfer app that allows for easy payments straight from a user’s bank account, similar to Venmo or PayPal, that’s “backed” by banks. Like most social engineering tactics, the scam preys on an individual’s trust.

Read More
Phishing test statistics

How Many Employees Fail an Email Phishing Security Test?

Stats show that 30% of your employees will fail, and fall for a fake email, and potentially get you ransomware.

Read More
Juice Jacking

1 min read

5 Ways to Protect Your Mobile Phone from Juice-Jacking

We’ve all been there. You’re in the airport and need to quickly charge your phone before you jump on your plane. Fortunately, airports now have...

Read More
multi-factor authentication

2 min read

What is Multifactor Authentication (MFA)?

"Only 11% of enterprise users make use of those tools (Speaking of MFA). That means a staggering 89% of accounts remain open to fairly simple...

Read More
Home Internet

5 min read

Work from Home (WFH) Slowing Down your Home Internet?

Does your home internet feel slower, less reliable, than it was, just last year? Are your once smooth, HD movies now looking pixelated and choppy?...

Read More
Security Awareness Training

3 min read

What is Security Awareness Training?

92% of all breaches could have been prevented with a Security Awareness Training program. Security Awareness Training is a means to educate and train...

Read More
Business Email Compromise, CEO Fraud

4 min read

What is Business Email Compromise (BEC) aka CEO Fraud?

More than 30,700 organizations were targeted in the first quarter of 2020 with Business Email Compromise attacks.

Read More

4 min read

Why Co-Managed IT is the Best of Both Worlds

Today’s IT professional has so much more on their plate than ever before. “IT infrastructure leaders often feel that they’re constantly in catch-up...

Read More

2 min read

Work from Home - 4 Ways to Stay Secure

Since the onset of the COVID-19 pandemic, many companies have spent the last few months scrambling to get their staff properly set up for remote work.

Read More
MDR Shield

2 min read

What is Managed Detection and Response (MDR)?

The Average Time it takes to identify a data breach is 197 days. The average time it takes to contain a breach is 69 days. With the volume of cyber...

Read More
Ransomware Attack via Phishing

4 min read

What is Ransomware?

The average ransom paid by a victim, increased by 60%, rising from $111,605 to $178,254 - according to a recent report from Coveware, comparing the...

Read More
About RansomCloud

2 min read

Introducing RansomCloud. The Evolution of Ransomware.

RansomCloud attacks your cloud data! It’s a ransomware attack built for the cloud...

Read More
Business email compromise BEC

1 min read

5 Tips to Prevent Business Email Compromise (BEC)

Business Email Compromise (BEC) is one of the leading cyber threats today so it's important to know that there are many valuable tips for keeping...

Read More
The Dark Web

1 min read

What is the Dark Web?

There are multiple layers to the internet. The Dark Web is an unseen layer contained within the Deep Web, another sub-layer of the Internet that is...

Read More
Business Email Compromise Millions of Attacks

3 min read

FBI Reports Business Email Compromise (BEC) Cost Businesses $1.7B in 2019

Let me tell you a True Story about a Business Email Compromise BEC. It was one of those calls that I sometimes dread not knowing entirely what to...

Read More
manufacturing ransomware image

2 min read

Manufacturing Represents 62% of Ransomware Payouts

Manufacturing Represents 62% of all Ransomware Payments In 2017 Kivu facilitated ransom payments of over $17m for over 143 cases . Of this they took...

Read More
MFA

2 min read

Why you should use MFA for everything!

Have you had your password stolen? According to Avast, a company that specializes in anti-virus software and VPN services, over 29 billion passwords...

Read More
Return to Work

1 min read

COVID-19 Return to Work Plan

As a Managed Information Technology Services Provider, and an essential critical infrastructure business, Teknologize has continued to operate and...

Read More
multi-factor authentication

1 min read

Why You Should Enable Multi-Factor Authentication Today!

Multi-factor authentication is a methodology whereby someone is granted access to a computer, device, or application only after providing two or more...

Read More
identity theft

2 min read

Why Identity Theft is a Big Deal During COVID-19

Should you be concerned about your identity being compromised? Yes! In 2019, 14.4 million consumers became victims of identity fraud — that’s about 1...

Read More
Cybersecurity Awareness Training

1 min read

Quadrupled Cyber Threat vs Security Awareness Training

I had a couple statistics that I was looking at last week, and they kind of blew my mind, so I thought I'd share them with you.

Read More
Wire Fraud

1 min read

The Basic Framework of COVID-19 Themed Wire Fraud

According to a report from Microsoft, COVID-19-themed cyber attacks spiked to nearly a million a day during the first week of March 2020.

Read More
remote work

1 min read

8 Tips For Developing a Positive and Productive Remote Work Culture

The workplace is going hybrid. Work can only happen anywhere when it’s digitized and connected.

Read More
Is Zoom Safe

1 min read

Is Zoom Safe? Zoom Meeting Security Tips During COVID-19

The FBI has received multiple reports of video teleconferencing and online classroom hijacking, also called “Zoom-bombing”, during the COVID-19.

Read More
Hackers on MSP

3 min read

Hackers Target MSP's to get to You!

To get inside Managed Service Providers, MSPs, attackers have capitalized on security lapses such as weak passwords and failure to use multi-factor...

Read More
AI

2 min read

Can AI help Your Small Business?

36% of executives say their primary goal for AI is to optimize internal business operations according to Harvard Business Review.

Read More
cybersecurity

1 min read

Publication: 5 Tips to Reduce Your Vulnerability to Cyberattacks

A Tri-Cities Area Journal of Business Publication. Six trillion dollars. It’s the estimated cost of the war on terror. And it’s the projected annual...

Read More
ransomware

1 min read

KAPP-KVEW Interview: The Next Evolution of Ransomware

Carissa Lehmkuhl from KAPP-KVEW interviewed Byron Martin, CEO of Teknologize leading up to our Breakfast Series "The Evolution of Ransomcloud." By...

Read More
HFG State of Technology

1 min read

State of Technology - Connect Magazine

By Byron Martin | HFG Trust Connect Magazine - July 2019 | View Article Technology has never been so important to businesses and individuals as it is...

Read More
Strategic IT

1 min read

Is Your Current IT Keeping Your IT Strategy in Line With Your Business?

IT Strategy (Information Technology Strategy or Technology Strategy) is a plan of action to create an information technology capability for maximum,...

Read More
downtime

1 min read

Downtime is eating away your profits. Your business deserves better.

As a business owner, you know that time is money. The more time your business is up, the more potential you have to close a sale, please a customer,...

Read More
IT Support

1 min read

Stop Waiting for IT Support to Show Up at Their Convenience

Spending hours or days waiting for your IT guy to arrive isn’t worth it. That’s bad IT. And you don’t have to live with it.

Read More
password security

1 min read

A Password is like a Toothbrush

When was the last time you thought about the password policy for your business?

Read More
IT Budget

2 min read

How Much do Companies Spend on their IT Budgets?

The percentage of spending that goes towards technology varies from one industry to another. For example, a financial entity will usually invest more...

Read More