The Tek Blog

Articles for business leaders covering topics such as technology, cybersecurity, and compliance.

Cybersecurity (3)

cyber insurance

3 min read

The Future of Cyber Insurance

The FBI’s Internet Crime Complaint Center (IC3) saw a 69% increase in the number of cybercrime reports it received in 2020 compared to 2019. On...

Read More
cyber insurance

3 min read

Why Cyber Insurance is Critical

The cyber insurance market is getting stricter and for many organizations, it’s getting more challenging and expensive to secure coverage.

Read More
threat hunting

2 min read

Threat Hunting. Who is Hiding in Your Network?

Who is hiding in your network?

Read More
Information Technology

1 min read

Connect Magazine - Technology

By Byron Martin | HFG Trust Connect Magazine - October 2021 | View Article When the COVID-19 pandemic hit, in some ways the timing was a blessing.

Read More
Microsoft CSP

3 min read

Benefits of Partnering with a Microsoft CSP

We’ve witnessed a shift in how we work to that of a hybrid workforce, a blended workforce comprising of both remote and in-office work. As such,...

Read More
endpoint security

4 min read

Endpoint Security vs. Antivirus Software

Hackers initiate 2,244 attacks per day. Every link clicked, email opened, app downloaded, and network joined is an opportunity for hackers to...

Read More
information technology

2 min read

Cybersecurity is not Information Technology (IT)

Your cybersecurity has to win every time, but the attacker only needs to win once.

Read More
SaaS Applications

3 min read

Must Have Google Workspace Security Configurations

Migrations to the cloud are moving faster than ever. 78% of businesses will be run almost entirely on SaaS Applications.

Read More
IoT

4 min read

IoT Medical Device Security

Forbes estimates 646 million IoT devices were used in hospitals, clinics, and medical offices in 2020. The Internet of Things has transformed the way...

Read More
hack

4 min read

Hacked Colonial Pipeline Ransomware Attack Forces Shutdown

The shutdown has caused panic in many southeastern states.

Read More
cybersecurity

3 min read

5 Cybersecurity Questions to Ask Your IT Company

60 percent of small businesses that are victims of a cyber-attack go out of business within six months.

Read More
cybersecurity

6 min read

21 Cybersecurity Horror Stories and Stats!

Cybercrime is the greatest threat to every company in the world. And Most companies take nearly 6 months to detect a data breach, even major ones.

Read More
Microsoft Exchange

5 min read

The Microsoft Exchange Attack Isn’t Going Away Anytime Soon

Estimates put the number of servers compromised by the attack in the hundreds of thousands globally.

Read More
HIPAA

4 min read

HIPAA Breach Notification Rule

642 healthcare data breaches of 500 or more records were reported in 2020, according to HIPAA Journal. That equates to 1.76 data breaches reported...

Read More
microsoft exchange

3 min read

Microsoft Exchange Hack. Patch Now!

Urgent patching necessary. Microsoft continues to see increased attacks targeting unpatched systems by multiple malicious actors beyond Hafnium...

Read More
spear phishing

4 min read

7 Reasons Why Spear Phishing Attacks are Successful

Phishing/social engineering is the #1 cause of data breaches and the primary delivery method for ransomware.

Read More
Spam Email

3 min read

Why You Need Spam Email Filtering

According to Help Net Security, 90% of successful cyberattacks occur through email-based attacks. Additionally, 1 out of every 8 employees shares the...

Read More
wind farm

1 min read

Teknologize and Uptime Podcast on IT and Cybersecurity for Wind Farms

Interesting conversation around the IT and Cybersecurity demands of the modern wind farm and the critical technology running behind the scenes....

Read More
Data Breach

2 min read

Data Breach Notifications Laws for Oregon State

What does Oregon law require you to do, and who are you required to notify? What happens if you don’t notify anyone?

Read More
Email Security

1 min read

Email Security: 4 Simple Tips to Keep Your Business Email Secure

There are over 300 million fraudulent sign-in attempts to Microsoft cloud services every day.

Read More
Business Continuity and Downtime

2 min read

Business Continuity: How to Be Prepared for Downtime or an IT Disaster

Flood. Power outage. Cyberattack. Supply chain failure or a disgruntled employee. Disruptions to your business can happen at any moment causing...

Read More
BYOD Mobile Device Management

8 min read

BYOD: Let’s Talk about Mobile Device Management

87% of companies are dependent to some extent on their employee’s ability to access mobile business apps from their personal smartphones. (Source:...

Read More
Data Breach Notification

2 min read

Data Breach Notifications Laws for Washington State

New data breach protections give Washington one of the most robust data breach notification policies in the country.

Read More
Incident Response Email Breach

4 min read

Incident Response: How to Respond to an Email Breach

Business Email Compromise earned hackers $1.3 billion in a year. (Source: Internet Crime Complaint Center)

Read More
healthcare cyber attack

8 min read

The Human Toll of a Healthcare Cyberattack

Vermont hospital cyber attack “Clinics were filled with tears, yelling and anxiety and stress”.

Read More
SolarWinds Supply Chain Breach

2 min read

SolarWinds Orion Supply Chain Breach Update

Roughly 198 organizations, overall, were hacked using the SolarWind backdoor, according to Allan Liska, a threat analyst at Recorded Future. Source:...

Read More
Sunburst Malware SolarWinds

2 min read

SUNBURST Malware and SolarWinds Supply Chain Breach

As reported approximately 2 weeks ago, the US Government and thousands of public and private sector organizations around the world had their networks...

Read More
SolarWinds Hack

5 min read

Massive SolarWinds Hack Impacting 18,000 Organizations

18,000 organizations have malicious code in their network, and 50 of them have suffered major breaches.

Read More
BEC Scam

3 min read

I Fell Victim to Business Email Compromise. Now What?

The FBI defines Business Email Compromise (BEC) as “a sophisticated scam that targets both businesses and individuals who perform valid...

Read More
cybersecurity

2 min read

CyberSecurity: Journey, Culture and Strategy

It doesn't have to be a big stress in your life. You can have that peace of mind, but it does take time, attention, planning and strategy...

Read More
incident response

4 min read

Four Steps of an Incident Response Plan

Hackers attack every 39 seconds, on average 2,244 times a day. (University of Maryland) Incidents are cyber events that can include a cyberattack,...

Read More
safe online shopping

1 min read

Stay Safe Online - 5 Tips for Safe Online Shopping

The holiday shopping season is well underway, and many are choosing to shop primarily online due to the COVID-19 Pandemic. Online shopping opens the...

Read More
phishing

4 min read

What is the Definition of Phishing?

phish·ing /ˈfiSHiNG/ noun the practice of using fraudulent e-mails and copies of legitimate websites to extract financial data from computer users...

Read More
endpoint security

2 min read

What's the Difference Between Antivirus and Endpoint Security?

Every endpoint connected to the Internet faces 1.5 attacks per minute. According to a study by the Ponemon Institute, 68% of organizations have...

Read More
password security

2 min read

10 Tips for Better Password Security

81% of data breaches are caused by compromised, weak, and reused passwords. Password security is a key to keeping your information safe on the web.

Read More
email phishing

1 min read

Local Businesses Falling Prey to Phishing Email!

Teknologize has recently seen a major uptick in email-based cyberattacks happening right now and right here in our own backyard.

Read More