Tri-cities, WA
Bend, OR
SUPPORT TICKET
PAY ONLINE
Managed IT
MANAGED IT
Managed IT Services
Co-Managed IT
Worry Free IT
Professional Services
PROFESSIONAL SERVICES
Professional Services
Technology Assessments
Policy and Compliance
Cybersecurity
CYBERSECURITY
Cybersecurity
Security Services
Managed Security
Incident Response & Remediation
Who we help
WHO WE HELP
Small & Mid-sized Business
Energy
Banking
Healthcare
Who we are
WHO WE ARE
About Us
Contact Us
Blog
Managed IT
Managed IT Services
Worry Free IT
Co-Managed IT
Professional Services
Professional Services
Technology Assessments
Policy and Compliance
Cybersecurity
Cybersecurity
Managed Security
Security Services
Incident Response & Remediation
Who we help
Banking
Energy
Small & Mid-sized Business
Healthcare
Who we are
About Us
Contact Us
Resources
Blog
News and Events
Blog
Focus on your business.
Read the latest from Teknologize.
Data Breach Notifications Laws for Oregon State
By
Byron Martin
|
February 2, 2021
What does Oregon law require you to do, and who are you required to notify? What happens if you don’t notify anyone?
Read More
Email Security: 4 Simple Tips to Keep Your Business Email Secure
By
Byron Martin
|
January 29, 2021
There are over 300 million fraudulent sign-in attempts to Microsoft cloud services every day.
Read More
Business Continuity: How to Be Prepared for Downtime or an IT Disaster
By
Byron Martin
|
January 28, 2021
Flood. Power outage. Cyberattack. Supply chain failure or a disgruntled employee. Disruptions to your business can happen at any moment causing..
Read More
BYOD: Let’s Talk about Mobile Device Management
By
Byron Martin
|
January 26, 2021
87% of companies are dependent to some extent on their employee’s ability to access mobile business apps from their personal smartphones. (Source: ..
Read More
Data Breach Notifications Laws for Washington State
By
Byron Martin
|
January 22, 2021
New data breach protections give Washington one of the most robust data breach notification policies in the country.
Read More
Incident Response: How to Respond to an Email Breach
By
Byron Martin
|
January 18, 2021
Business Email Compromise earned hackers $1.3 billion in a year. (Source: Internet Crime Complaint Center)
Read More
The Human Toll of a Healthcare Cyberattack
By
Byron Martin
|
January 15, 2021
Vermont hospital cyber attack “Clinics were filled with tears, yelling and anxiety and stress”.
Read More
SolarWinds Orion Supply Chain Breach Update
By
Byron Martin
|
January 14, 2021
Roughly 198 organizations, overall, were hacked using the SolarWind backdoor, according to Allan Liska, a threat analyst atRecorded Future.Source:..
Read More
SUNBURST Malware and SolarWinds Supply Chain Breach
By
Byron Martin
|
December 31, 2020
As reported approximately 2 weeks ago, the US Government and thousands of public and private sector organizations around the world had their networks..
Read More
Massive SolarWinds Hack Impacting 18,000 Organizations
By
Byron Martin
|
December 23, 2020
18,000 organizations have malicious code in their network, and 50 of them have suffered major breaches.
Read More
I Fell Victim to Business Email Compromise. Now What?
By
Byron Martin
|
December 22, 2020
The FBI defines Business Email Compromise (BEC) as “a sophisticated scam that targets both businesses and individuals who perform valid..
Read More
CyberSecurity: Journey, Culture and Strategy
By
Byron Martin
|
December 2, 2020
It doesn't have to be a big stress in your life. You can have that peace of mind, but it does take time, attention, planning and strategy...
Read More
Four Steps of an Incident Response Plan
By
Byron Martin
|
December 1, 2020
Hackers attack every 39 seconds, on average 2,244 times a day. (University of Maryland) Incidents are cyber events that can include a cyberattack,..
Read More
Stay Safe Online - 5 Tips for Safe Online Shopping
By
Byron Martin
|
November 25, 2020
The holiday shopping season is well underway, and many are choosing to shop primarily online due to the COVID-19 Pandemic. Online shopping opens the..
Read More
What is the Definition of Phishing?
By
Byron Martin
|
November 17, 2020
phish·ing /ˈfiSHiNG/ noun the practice of using fraudulent e-mails and copies of legitimate websites to extract financial data from computer users..
Read More
What's the Difference Between Antivirus and Endpoint Security?
By
Byron Martin
|
November 12, 2020
Every endpoint connected to the Internet faces 1.5 attacks per minute. According to a study by the Ponemon Institute, 68% of organizations have..
Read More
10 Tips for Better Password Security
By
Byron Martin
|
November 9, 2020
81% of data breaches are caused by compromised, weak, and reused passwords. Password security is a key to keeping your information safe on the web.
Read More
Local Businesses Falling Prey to Phishing Email!
By
Byron Martin
|
November 4, 2020
Teknologize has recently seen a major uptick in email-based cyberattacks happening right now and right here in our own backyard.
Read More
FBI Warns Imminent Cyber Attacks Threatening Healthcare
By
Byron Martin
|
November 3, 2020
In a joint alert, Wednesday October 28th, 2020 from the FBI, DHS, and the Cybersecurity and Infrastructure Security Agency states “credible..
Read More
Business Email Compromise (BEC) & Wire Fraud
By
Byron Martin
|
October 10, 2020
Also known as CEO Fraud. Listen to CEO, Byron Martin, explain how hackers can get access to your email and what to be aware of. This is a billion..
Read More
Top 4 Cybersecurity Basics to Implement Now
By
Byron Martin
|
October 8, 2020
October is National Cybersecurity Awareness Month. Instituted by the Department of Homeland Security in 2016, this month is a time where we want to..
Read More
What is Multifactor Authentication (MFA)?
By
Byron Martin
|
September 29, 2020
"Only 11% of enterprise users make use of those tools (Speaking of MFA). That means a staggering 89% of accounts remain open to fairly simple..
Read More
What is Security Awareness Training?
By
Byron Martin
|
September 22, 2020
92% of all breaches could have been prevented with a Security Awareness Training program. Security Awareness Training is a means to educate and..
Read More
What is Business Email Compromise (BEC) aka CEO Fraud?
By
Byron Martin
|
September 17, 2020
More than 30,700 organizations were targeted in the first quarter of 2020 with Business Email Compromise attacks.
Read More
Work from Home - 4 Ways to Stay Secure
By
Daniel Morgan
|
September 13, 2020
Since the onset of the COVID-19 pandemic, many companies have spent the last few months scrambling to get their staff properly set up for remote work.
Read More
What is Managed Detection and Response (MDR)?
By
Byron Martin
|
September 12, 2020
The Average Time it takes to identify a data breach is 197 days. The average time it takes to contain a breach is 69 days. With the volume of cyber..
Read More
What is Ransomware?
By
Byron Martin
|
September 11, 2020
The average ransom paid by a victim, increased by 60%, rising from $111,605 to $178,254 - according to a recent report from Coveware, comparing the..
Read More
Introducing RansomCloud. The Evolution of Ransomware.
By
Byron Martin
|
September 9, 2020
RansomCloud attacks your cloud data! It’s a ransomware attack built for the cloud...
Read More
5 Tips to Prevent Business Email Compromise (BEC)
By
Byron Martin
|
August 3, 2020
Business Email Compromise (BEC) is one of the leading cyber threats today so it's important to know that there are many valuable tips for keeping..
Read More
What is the Dark Web?
By
Byron Martin
|
July 31, 2020
There are multiple layers to the internet. The Dark Web is an unseen layer contained within the Deep Web, another sub-layer of the Internet that is..
Read More
FBI Reports Business Email Compromise (BEC) Cost Businesses $1.7B in 2019
By
Byron Martin
|
July 30, 2020
Let me tell you a True Story about a Business Email Compromise BEC. It was one of those calls that I sometimes dread not knowing entirely what to..
Read More
Manufacturing Represents 62% of Ransomware Payouts
By
Byron Martin
|
July 27, 2020
Manufacturing Represents 62% of all Ransomware Payments In 2017 Kivu facilitated ransom payments of over $17m for over 143 cases . Of..
Read More
Why you should use MFA for everything!
By
Byron Martin
|
June 22, 2020
Have you had your password stolen? According to Avast, a company that specializes in anti-virus software and VPN services, over 29 billion passwords..
Read More
Why You Should Enable Multi-Factor Authentication Today!
By
Byron Martin
|
May 28, 2020
Multi-factor authentication is a methodology whereby someone is granted access to a computer, device, or application only after providing two or..
Read More
Why Identity Theft is a Big Deal During COVID-19
By
Byron Martin
|
May 22, 2020
Should you be concerned about your identity being compromised? Yes! In 2019,14.4 million consumersbecame victims of identity fraud — that’s about 1..
Read More
Quadrupled Cyber Threat vs Security Awareness Training
By
Byron Martin
|
May 8, 2020
I had a couple statistics that I was looking at last week, and they kind of blew my mind, so I thought I'd share them with you.
Read More
Prev
1
2
3
4
Next