2020 Cybersecurity Webinar

2020 Cybersecurity Webinar October is National Cyber Security Awareness Month Date : Tuesday, October 6, 2020 Time : 9AM, MST Location : Zoom Meeting Speakers : Nathan Wallace, President Tiffany Welch, Technology Consultant Thomas Carlin, Network Engineer Cybersecurity is not a 'one and done' solution. It evolves as the cyber criminals evolve. We all know that [...]

2020-09-18T13:31:53-06:00September 18th, 2020|

4 Top Insider Threats

Are These Top Insider Threats Lurking Behind Your Doors? Information Courtesy of E-TECH The Dangers of Insider Threats Many business owners - and the IT professionals they rely on - focus on protecting their companies from external threats – the lone hacker out for a large ransom, the industry competitor pilfering secrets, or organized cyber-criminals with [...]

2020-09-04T14:43:42-06:00September 4th, 2020|

Consent Phishing Attacks

Protecting your remote workforce from consent phishing Information Courtesy of Microsoft With increased cloud app usage and the shift to working from home, security and how employees access company resources are even more top of mind for companies. While application use has accelerated and enabled employees to be productive remotely, attackers are looking at leveraging application-based attacks [...]

2020-08-13T11:08:28-06:00August 13th, 2020|

Warning over Windows 7 EOL

The FBI says companies running Windows 7 systems are now in greater risk of getting hacked due to a lack of security updates. Information Courtesy of ZDNet The Federal Bureau of Investigation has sent a private industry notification (PIN) on Monday to partners in the US private sector about the dangers of continuing to use Windows [...]

2020-08-06T16:08:10-06:00August 6th, 2020|

Why Businesses Need to Back Up Data

Why you need to back up critical data Even if you trust your equipment 100% Information Courtesy of Kaspersky Daily For almost any business, information is critical: documents, contacts, contracts, correspondence, accounts, and so on. For most companies, losing access to data means the suspension of all business processes, inevitably leading to lost [...]

2020-07-20T16:43:53-06:00July 20th, 2020|

Common Tricks for Hijacking Microsoft 365 Accounts

The hunt for Office (Microsoft) 365 accounts Courtesy of Kaspersky Daily The current surge in remote working has raised cybercriminal interest in Office (Microsoft) 365, one of the most common cloud collaboration platforms. Please Note: As of April 21, 2020, Microsoft has officially changed the name of its productivity suite from Office 365 to Microsoft 365. The [...]

2020-07-08T15:42:50-06:00July 8th, 2020|

Key Cyber Security Terms

Defining Cyber Security Cyber Security is: the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this. Small businesses in particular have become the prime target of cyber attacks, and 60 percent of SMBs go out of business within 6 months of a breach. Defining cyber security terms [...]

2020-06-29T13:39:18-06:00June 29th, 2020|

How Scammers Target SMBs

Common attack schemes targeting SMB employees Courtesy of Kaspersky Daily Online scammers are forever trying to trick not only unsuspecting users, but also company employees. Sure, it’s usually far harder to dupe a business than a retiree, but the potential rate of return is far higher in the former case. Therefore, attempts to get SMBs (Small-Medium Businesses) to [...]

2020-06-19T13:58:12-06:00June 19th, 2020|

Avoiding Risks as a SMB

Top Security Risks to Your Small Business Original Article Courtesy of The Hartford, Small Biz Ahead Target’s 2013 data breach cost the company $250 million in damages after hackers managed to steal around 40 million customers’ credit and debit card numbers. But the true overall cost can be hard to measure when you consider the bad press, the [...]

2020-05-27T08:45:27-06:00May 27th, 2020|

VoIP Business Phone Solution

What is VoIP? Even if you have never heard of VoIP, you may already be using it. VoIP – voice over internet protocol – is generally used to refer to a method of transmitting voice and multimedia communication via data packet from one user to another. Whereas regular landline or cellphones use satellite, cell or landline towers, VoIP [...]

2020-05-18T16:24:28-06:00May 18th, 2020|


P: 970-242-8142
Toll Free: 866-778-8142
F: 970-242-8139
E: [email protected]

302 South Ave. Grand Junction, CO 81501

  • This field is for validation purposes and should be left unchanged.