OUR TECH BLOG
Stay Current With What’s New in IT
Security Threats Go Both Ways: Why web security isn’t just an “inbound” problem.
Many of the most well-known web security...
4-Step Approach to Website Security
When dealing with website security, you need to...
Team Member Spotlight: Justin Dobner, Service Manager
Not that long ago, Justin Dobner was managing a...
Top cybersecurity tips for the holiday season
Email Account Takeover is Your Business’s Greatest Threat—and Here’s Why
In today's mobile business environment, using...
Team member spotlight: Mat Mingl, Internet Service Manager
Top 3 Signs It’s Time to Replace Your Server… What’s in Your IT Budget?
The seasons are changing and the temperatures...
What is spear phishing and how can it be avoided?
Phishing is a way that cyber criminals attempt...
Team Member Spotlight: Sales Manager, Chris Higgins
Chris Higgins’ enthusiasm and care for customers...
Is Google redirecting visitors away from your site? (Hint: It’s not Google. You’ve been hacked.)
What your team needs to know about email phishing scams
Most of us have grown wary and can recognize the...
Team Member Spotlight: Controller, Robert Paulson
Firewalls aren’t “one size fits all”: Keep your team happy and network safe by tailoring user profiles.
Once upon a time, a firewall was just what it...
If you think one security program is enough, think again: how anti-malware solutions work.
Relying on one software provider for all of your...
Is your Internet slow? Your router may be to blame.
You’ve no doubt experienced stressful days at...
Cybersecurity 101: 3 critical areas where you need protection
Many business owners think that a decent...
Has your website been hacked? (It may not be the server).
Hacked, spoofed, spammed, infected, hijacked,...
Got $27,000 to spare? That’s what this small business lost to a cyber attack.
With no website and only two employees, this New...
Team Member Spotlight: Computer Technician Lou Roedel
Lou is a seasoned, detail-oriented technician...
Keep your network safe when employees work remotely
When your remote employees login to your network...