What is ransomware? How could have the City of Tulsa been hit with a ransomware attack? Let's dive in!
Many IT headaches can be avoided by outsourcing your IT management needs. It's not for everyone, however. Learn if its right for you.
A "free WiFi" connection can be a traveler's best friend, but can soon become your device's worst nightmare. Learn how to stay safe.
So, your laptop is missing—now what? Here are 5 next steps to take to minimize the damage of so much stolen information.
Data breaches can wreak havoc on businesses—not only in the price to fix them, but what they do to their image among customers. As we prepare for the release of the 2020 Ponemon Institute Data Breach
Regardless of the nature of the problem, data leaks can be devastating to businesses. Here are some key findings that show just how harmful data leaks are.
Gather around and hear the tale of printer that cost one healthcare organization over $1 million...and how to avoid such a mess yourself.
Enjoy this overview of the recommended tools, equipment, practices, and services for optimal remote working environments for your team members.
Can you find documents in a timely manner? Do you find yourself saying things like, "this is the way we've always done it"? It's time for a change.
Many have had their identity stolen by this ridiculously loose handling of cell phone SIM cards. Learn how to avoid being next.
If you ever thought that cyber security threats wouldn't waste their time with construction companies, unfortunately, you're dead wrong.
Instead of a complex heist, what if the plot of Oceans 11 involved a very manual brute force attack of the Bellagio's Employee's Only area?
Going to the gym and reading more books are great, but how about the new years resolution to strengthen your passwords? More ideas here!
Learn how to limit the risks associated with accessing secure business networks while working remotely — or even on the go.
Sure, your network is secure, but what about physical data storage equipment? Learn a few simple ways to keep physical drives secure.
Check out these five network considerations that you may not have even thought to think about.
Are you ignoring system updates? More than feature updates, these patches can keep your system safe from emerging cybersecurity threats
Are you a chronic social media oversharer? The details you provide may be putting your private info or even company data at risk.
Two-step authentication is great...until someone steals your phone number. Learn how this happens and how to prevent it.
How would you feel if you logged in to find all of your files held for ransom? That's what happened to hundreds of dental offices.
It's not just the largest companies that are at risk against cyber threats. Fortunately, there are SMB Electronic Content Management services available.
For workers on the go, laptops are a blessing. For data security specialists, they can be a curse.
In this piece, we discuss what data encryption is, how to encrypt data, and how to make it a part of your document management protocol.
Are you still keeping passwords on sticky notes or in Word files? Are you reusing passwords across systems? Get a password manager already.
Faxes may feel like an outdated medium, but they are still held up in court more than emails in many instances. But why is this so?
No, they're not sorcery — they're legally binding signatures. Electronic or digital signatures sure make life easier...but how do they work?
A vCIO fills in the technology gap between a technician and a full-time director...and then some.
While we're very happy to not be required to keep paper documents anymore, it's still important to be UETA compliant. What does that mean? Let's learn!
Learn what spear phishing is, how it differs from regular phishing, and how to protect yourself against a spear phishing attack.
Have you recently come across an abandoned USB flash drive? Be cautious of plugging that thumb drive into any computer.
The wheels of justice are spinning just a bit faster thanks to electronic content management systems in the judicial system.
The security, flexibility and price of file management is evolving. How is your company keeping up with the times?
What is the difference between "http://" and "https://" and why does an SSL certification matter? In this piece, we'll answer these questions and more.
Is your organization making any of these five data security mistakes? The consequences could be immensely expensive.
Every day, businesses deal with confidential data containing everything from company trade secrets and marketing research, to social security numbers and addresses of employees. Recent news headlines
Being aware of the typical IT mistakes made by other small businesses can help you avoid making them in your small business.
Gather 'round to hear the story of how Managed Network Services helped a nameless company help eliminate technology downtime.
All client names have been changed due to confidentiality agreements.While JD Young certainly has the ability to act as a company’s primary IT provider, we also have the ability to come alongside
All client names have been changed due to confidentiality agreements.Using the friendly neighborhood IT guy is fine when a company is starting out. But when the friendly neighborhood IT guy sets u
The cloud has allowed companies to expand their services and offerings without having to invest in a costly onsite server system. While this is a great opportunity for those who take advantage of the
To avoid problems down the road, there must be policies created that will analyze what can be archived and what can be permanently deleted.
Many companies find it problematic to reach a balance between physical documents and the sometimes mysterious dream of going completely paperless. Though physical and digital documents both offer thei
One huge time suck for lots of businesses is dealing with invoices. Scanning invoices offers four ways to save time with invoices.
The WannaCry VirusOver the weekend, the world experienced one of the most severe ransomware outbreaks (named WannaCry) in history, with businesses of all sizes in over 150 countries impacted. Most n
Learn the 3 reasons why more data has been created in the past 30 years than in the past 5,000.
The cloud has been an IT buzzword for a long time now, but a lot of people still don’t fully understand what the cloud is, or how it can be used to help their company.Official Definition- If you G
The significance of IT security can’t be exaggerated, and it’s vital that every company take steps to defend against attack. Being familiar with the three primary kinds of IT security will help you ma
Asking the right questions and understanding the available safeguards for your data will help protect your business.
Anytime an employee leaves, whether they were full-time, temporary, or seasonal, it’s important to tie up any IT security loose ends. This means you need to check for all of the following:Desk- Ch
Proactive is always better than reactive, and that goes double for IT risk management. With 55 percent of small-medium sized businesses experiencing a cyber attack in the past year, and 50 percent exp