Did you know that Microsoft 365 does NOT guarantee against data loss? In fact, their Services Agreement recommends backing up with a third-party app. Section 6b says, “you may not be able to retrieve your content or data that you’ve stored.” Fortunately, there are several things you can do to keep your data safe. Backup […]
Category Archives: Security
One step in the network security cycle you should never skip is a security audit — doing so puts your business at risk of cyberattacks and data loss. Read on to understand how security audits can make or break your system integrity. Auditing and the security strategy Audits are necessary to maintain system integrity and […]
Every business should have a strong cybersecurity posture to keep cybercriminals from infiltrating their network. One way to do this is by implementing a strict authentication process using two-step or two-factor authentication. These two processes are so similar that many confuse one with the other. Learn the difference between the two and how you can […]
With the prevalence of cyberattacks on companies of all sizes these days, businesses cannot afford to relegate cybersecurity to the bottom of their budget priorities. When it comes to cybersecurity, even small businesses should partner with a managed IT services provider (MSP). Here’s why it’s crucial to partner with an MSP that can implement robust […]
2020 was a year like no other in recent memory. For years, regulators have required that annual Risk Assessments include rating the risk of pandemics… now we know why. Banks, like all businesses were largely caught by surprise with minimal plans in place when the shutdown happened. Because banks are required to provide essential services […]
With so much going on with ransomware and data breaches, RESULTS Technology has decided to focus yet another monthly newsletter solely on cybersecurity education. At the time of this writing, there are at least 3 high-profile cybersecurity incidents in the news, including attacks on hospitals, retailers, and political groups. If you think having antivirus and […]
A trend that has dramatically shifted in this pandemic is that cyber attackers are now taking their own sweet time to launch threats against businesses. They are using sophisticated, systematic cyber attack programs that continue for an extended time (called APTs) and small businesses are being used as stepping stones.
If you have been using the same business continuity plan (BCP) for years, your organization may be in trouble. BCPs should continuously be updated so you avoid overlooking or underestimating certain issues. Not updating your BCP is just one mistake that can harm your business. Here are a few more you should avoid. Over-optimistic testing […]
As soon as you focus on preventing downtime events instead of reacting to them, the productivity and efficiency of your IT infrastructure will increase to levels you’ve never dreamed of. It is good to have an IT team and/or a third-party partner like a managed services provider (MSP) that helps keep your company protected against […]
Join RESULTS Technology for a Small Business Webinar as we present Cyber Security for businesses with remote employees. We will discuss why a secure remote connection is important, the types of remote connections, safety requirements for remote connections and the risk levels associated with each. This educational small business event is perfect for business owners, […]