What is a BEC Attack and Why Should You Care?

What is a BEC Attack and Why Should You Care?

BEC stands for Business Email Compromise. And we promise that it’s the last acronym that we’ll us in this blog post. Everyday, spam filters deal with an onslaught of emails that are either: a) Definitely fake b) Possibly legitimate That’s it. There...
Beware of Fake Support

Beware of Fake Support

CEO scams, phishing emails, fake texts…the companies that we work with are always on the lookout. But managed service providers can be part of the problem. We’ve been diligent about letting users know but it pays to reinforce a couple of our rules. These...
Cybersecurity: 5 Weaknesses That Hackers Exploit

Cybersecurity: 5 Weaknesses That Hackers Exploit

NOT AS EASY AS “SET IT AND FORGET IT” Keeping your business safe isn’t a one-time thing and it’s not just a matter of adding firewalls and antivirus software. Cybercriminals take advantage of all sorts of vulnerabilities in your company. Some...
Remote Users and Security Updates

Remote Users and Security Updates

With everyone settling into work from their home digs, it’s important to make sure that the attitudes surrounding good computer security aren’t falling by the wayside. One of the unfortunate side effects of people becoming more decentralized is how much harder...