The Tek Blog

Articles for business leaders covering topics such as technology, cybersecurity, and compliance.

password security

2 min read

10 Tips for Better Password Security

81% of data breaches are caused by compromised, weak, and reused passwords. Password security is a key to keeping your information safe on the web.

Read More
email phishing

1 min read

Local Businesses Falling Prey to Phishing Email!

Teknologize has recently seen a major uptick in email-based cyberattacks happening right now and right here in our own backyard.

Read More
Cyber Attacks Target Healthcare

2 min read

FBI Warns Imminent Cyber Attacks Threatening Healthcare

In a joint alert, Wednesday October 28th, 2020 from the FBI, DHS, and the Cybersecurity and Infrastructure Security Agency states “credible...

Read More
Windows 10 Download

2 min read

Upgrade Today: Windows 10 Download Instructions

Windows 7 users who don't upgrade to Windows 10 will no longer be able to get Microsoft's security updates or technical support, leaving your...

Read More
Business Email Compromise (BEC)

3 min read

Business Email Compromise (BEC) & Wire Fraud

Also known as CEO Fraud. Listen to CEO, Byron Martin, explain how hackers can get access to your email and what to be aware of. This is a billion...

Read More
cybersecurity

2 min read

Top 4 Cybersecurity Basics to Implement Now

October is National Cybersecurity Awareness Month. Instituted by the Department of Homeland Security in 2016, this month is a time where we want to...

Read More
Voice-over-IP, VoIP

2 min read

6 Benefits of VoIP for the Work From Home Workforce

The world has been transitioning to remote working for years, but the arrival of COVID-19 has certainly sped that up. VoIP calls are routed over the...

Read More
Zelle vs Venmo

1 min read

Watch out for Zelle Scams...

The Zelle app is a person-to-person transfer app that allows for easy payments straight from a user’s bank account, similar to Venmo or PayPal,...

Read More
Phishing test statistics

How Many Employees Fail an Email Phishing Security Test?

Stats show that 30% of your employees will fail, and fall for a fake email, and potentially get you ransomware.

Read More
Juice Jacking

1 min read

5 Ways to Protect Your Mobile Phone from Juice-Jacking

We’ve all been there. You’re in the airport and need to quickly charge your phone before you jump on your plane. Fortunately, airports now have...

Read More
multi-factor authentication

2 min read

What is Multifactor Authentication (MFA)?

"Only 11% of enterprise users make use of those tools (Speaking of MFA). That means a staggering 89% of accounts remain open to fairly simple...

Read More
Home Internet

5 min read

Work from Home (WFH) Slowing Down your Home Internet?

Does your home internet feel slower, less reliable, than it was, just last year? Are your once smooth, HD movies now looking pixelated and choppy?...

Read More
Security Awareness Training

3 min read

What is Security Awareness Training?

92% of all breaches could have been prevented with a Security Awareness Training program. Security Awareness Training is a means to educate and train...

Read More
Business Email Compromise, CEO Fraud

4 min read

What is Business Email Compromise (BEC) aka CEO Fraud?

More than 30,700 organizations were targeted in the first quarter of 2020 with Business Email Compromise attacks.

Read More

4 min read

Why Co-Managed IT is the Best of Both Worlds

Today’s IT professional has so much more on their plate than ever before. “IT infrastructure leaders often feel that they’re constantly in catch-up...

Read More

2 min read

Work from Home - 4 Ways to Stay Secure

Since the onset of the COVID-19 pandemic, many companies have spent the last few months scrambling to get their staff properly set up for remote work.

Read More
MDR Shield

2 min read

What is Managed Detection and Response (MDR)?

The Average Time it takes to identify a data breach is 197 days. The average time it takes to contain a breach is 69 days. With the volume of cyber...

Read More
Ransomware Attack via Phishing

4 min read

What is Ransomware?

The average ransom paid by a victim, increased by 60%, rising from $111,605 to $178,254 - according to a recent report from Coveware, comparing the...

Read More
About RansomCloud

2 min read

Introducing RansomCloud. The Evolution of Ransomware.

RansomCloud attacks your cloud data! It’s a ransomware attack built for the cloud...

Read More
Business email compromise BEC

1 min read

5 Tips to Prevent Business Email Compromise (BEC)

Business Email Compromise (BEC) is one of the leading cyber threats today so it's important to know that there are many valuable tips for keeping...

Read More
The Dark Web

1 min read

What is the Dark Web?

There are multiple layers to the internet. The Dark Web is an unseen layer contained within the Deep Web, another sub-layer of the Internet that is...

Read More
Business Email Compromise Millions of Attacks

3 min read

FBI Reports Business Email Compromise (BEC) Cost Businesses $1.7B in 2019

Let me tell you a True Story about a Business Email Compromise BEC. It was one of those calls that I sometimes dread not knowing entirely what to...

Read More
manufacturing ransomware image

2 min read

Manufacturing Represents 62% of Ransomware Payouts

Manufacturing Represents 62% of all Ransomware Payments In 2017 Kivu facilitated ransom payments of over $17m for over 143 cases . Of this they took...

Read More
MFA

2 min read

Why you should use MFA for everything!

Have you had your password stolen? According to Avast, a company that specializes in anti-virus software and VPN services, over 29 billion passwords...

Read More
Return to Work

1 min read

COVID-19 Return to Work Plan

As a Managed Information Technology Services Provider, and an essential critical infrastructure business, Teknologize has continued to operate and...

Read More
multi-factor authentication

1 min read

Why You Should Enable Multi-Factor Authentication Today!

Multi-factor authentication is a methodology whereby someone is granted access to a computer, device, or application only after providing two or more...

Read More
identity theft

2 min read

Why Identity Theft is a Big Deal During COVID-19

Should you be concerned about your identity being compromised? Yes! In 2019, 14.4 million consumers became victims of identity fraud — that’s about 1...

Read More
Cybersecurity Awareness Training

1 min read

Quadrupled Cyber Threat vs Security Awareness Training

I had a couple statistics that I was looking at last week, and they kind of blew my mind, so I thought I'd share them with you.

Read More
Wire Fraud

1 min read

The Basic Framework of COVID-19 Themed Wire Fraud

According to a report from Microsoft, COVID-19-themed cyber attacks spiked to nearly a million a day during the first week of March 2020.

Read More
remote work

1 min read

8 Tips For Developing a Positive and Productive Remote Work Culture

The workplace is going hybrid. Work can only happen anywhere when it’s digitized and connected.

Read More
Is Zoom Safe

2 min read

Is Zoom Safe? Zoom Meeting Security Tips During COVID-19

The FBI has received multiple reports of video teleconferencing and online classroom hijacking, also called “Zoom-bombing”, during the COVID-19.

Read More
Hackers on MSP

3 min read

Hackers Target MSP's to get to You!

To get inside Managed Service Providers, MSPs, attackers have capitalized on security lapses such as weak passwords and failure to use multi-factor...

Read More
AI

2 min read

Can AI help Your Small Business?

36% of executives say their primary goal for AI is to optimize internal business operations according to Harvard Business Review.

Read More
cybersecurity

1 min read

Publication: 5 Tips to Reduce Your Vulnerability to Cyberattacks

A Tri-Cities Area Journal of Business Publication. Six trillion dollars. It’s the estimated cost of the war on terror. And it’s the projected annual...

Read More
ransomware

1 min read

KAPP-KVEW Interview: The Next Evolution of Ransomware

Carissa Lehmkuhl from KAPP-KVEW interviewed Byron Martin, CEO of Teknologize leading up to our Breakfast Series "The Evolution of Ransomcloud." By...

Read More