Exposing the Process: How Fake Companies Are Set Up to Steal

It’s really easy and we’re going to show you how.  Let’s take a cybersecurity perspective on how criminals exploit the trust of small businesses by showing step by step how

Share
Inside IT: Why We Dread Updates as Much as You Do

The other day, I overheard one of our engineers on a call with a customer. The frustration was palpable: “STOP TRYING TO UPGADE MY COMPUTER! I’M SICK OF IT. EVERY

Share
ChatGPT AI is going to steal your passwords

Natural language AI like ChatGPT is going to increase the threat of phishing

Share
Can Your Workspace Be a Playground? Apple’s Vision Pro Says Yes!

When Apple releases new products, I want to know how they’re going to help my business customers. Custom graphics processors provide advantages on video workflows, next-generation WiFi means increased internet

Share
What is a MITRE ATT&CK?

A number of cybersecurity companies leverage MITRE ATT&CK into their solutions offering.  Essentially ATT&CK is a classification system to describe cyberattacks and intrusions, developed by Mitre corporation.  It’s no coincidence

Share
Train your staff to outsmart cyber criminals

Let’s consider the playing field: On one side, we have a group of criminals who spend day and night trying to find extremely clever ways to trick you into clicking

Share
Microsoft 2 Factor Authentication – you’re doing it wrong!

Using 2 Factor Authentication (2FA) on email is critical. For business users, if you’re not using 2FA already, we need to have a serious conversation – a conversation that ends

Share
Apple’s Push Notification changes will affect your network

TL;DR: Network admins can close outgoing ports 2195/2196 to Apple 17/A. On 3/31/21, Apple will deprecate its binary based Push Notification system in lieu of an HTTP based system.  The

Share
Security Compliance with MA 201 CMR 17.00

Every organization must take reasonable measures to protect personal information of others. We work with a number of businesses in Massachusetts and in this state, you must adhere to the

Share