Posts by John Mamon
Is Your Organization Prepared For Top 2020 Cybersecurity Threats?
IT cybersecurity professionals have been challenged to the hilt through the first half of 2020. At the height of the pandemic, phishing attacks increased by upwards of 600% – all while executives made haste to move to the Cloud or increase their remote workforce infrastructure. Industry leaders have been so busy dealing with emergencies at…
Read MoreHackers Target Zoom Meetings for Cyberattacks
Zoom Scrambles to Address Cybersecurity Issues in Meeting Platform As the usage of Zoom has skyrocketed during the coronavirus outbreak, the company has had to respond quickly to security flaws and potential phishing attacks As Zoom usage skyrockets around the world, so too do the opportunities to exploit users unfamiliar with the tool. The…
Read MoreWhat’s The Best Way To Switch IT Managed Service Providers?
The COVID-19 lockdowns have naturally changed how many organizations and companies operate. Educational institutions are embracing virtual classes, events that were previously held in person are now fully virtual, and a whopping 98% of employees worked from home to avoid spreading the novel coronavirus. Sadly, not all IT managed service providers were able to keep up with their customers’…
Read MoreWhat Does $150K Ransomware Payment Say About Your Cybersecurity?
$150K Ransomware Payment A recent news piece published by Tech Republic highlights the discouraging reasons why too many businesses fall prey to hackers and pay ransoms for their digital property. Perhaps nothing adds insult to injury quite like someone burglarizing your organization and then making you pay for their crime. A recent $150,000 ransom paid…
Read MoreShould I outsource IT to a Managed Service Provider?
Internal IT vs. Outsourcing IT: The Value of Outsourcing to a Managed Service Provider The question of whether to outsource or rely on an internal IT team is common. Services that were once considered “nice to have” are now necessities – including machine learning, artificial intelligence, and cloud computing. While they add a lot of…
Read MoreWhat Is Two-Factor Authentication?
Protect Yourself – Use Two-Factor Authentication for Your Business Two-factor authentication is something every business should be using to protect themselves and their customers. You know the value of adding layers of security to your business – if you have a brick and mortar operation, you probably have a lot more than a simple lock…
Read MoreProtect Your Team From Coronavirus Phishing
How to Protect Your Business From the Surge in Phishing Websites As the entire world is worrying about the coronavirus, cybercriminals are taking advantage of the global crisis to line their pockets. Google reports that there has been a 350% increase in phishing websites in the last two months alone. This threat is genuine, and…
Read MoreHackers Target Zoom Meetings For Cyber Attacks
Zoom Scrambles to Address Cybersecurity Issues in Meeting Platform The Zoom platform has increasingly has been the target of hackers exploiting the vast numbers of users working from home. As Zoom usage skyrockets around the world, so too do the opportunities to exploit users unfamiliar with the tool. According to MarketWatch, the company’s daily active user…
Read MoreRemote Workforces Deliver Business And Employee Benefits
When considering the employee and employer benefits of working remotely, businesses are wise to change. The alternative could make your outfit less competitive. To put into perspective how radically our culture has changed, try this exercise: pick up a pencil and a piece of paper and write out a half-day’s worth of emails rather…
Read MoreBusiness Continuity For Uncertain Times
It’s always a good idea to have a business continuity plan in place, especially in the midst of an epidemic like COVID-19. If it becomes necessary for your employees to work from home – either due to a government order or your own determination that it’s what’s best for the safety of your employees –…
Read More