Blog

Checklist to Tie Up 2019 Technology

Before you make your resolutions for 2020 we thought we would help you take a minute to tie up essential technology details from 2019. If you haven’t gotten around to these, put them at the top of your 2020 list!

Blog

Top Tech Gift Guide for 2019

Here at BEI, we polled our staff and as you can imagine, a group of techies have a large and interesting wish list.

Blog

Spotting Phishing in 2020 –Presented by The Reston Chamber

We want you to join us for this special presentation about phising and the dangers to look out for in 2020. Katherine Deming from BEI will be presenting this topic.

Blog

Holiday Shopping Primer

Whatever your holiday traditions, the experts advise us all to be a little wary online this time of year. Here are some easy tips to stay safe:
Holding the door for hacker

Blog

Don't Get Tricked by Hackers!

Cybercriminals are always on the hunt for easy access to your organization. Many times the easiest way in isn’t traditional hacking. Human hacking, more commonly known as social engineering, involves tricking an unsuspecting employee into giving hackers the access they need.

Blog

The Dark Web - A Scary Story

The Dark Web sounds frightening and it is. It is a place most of us will never visit – it can’t be reached via normal search engines such as Google or Bing.

Blog

Laptop Encryption for HIPAA Compliance

Arthritis and Rheumatism Associates (ARA) is a large healthcare practice based in Maryland. With approximately 20 physicians and more than 200 staff, ARA manages an extensive IT infrastructure.Successfully managing and encrypting these myriad devices is critical to ensuring good business practices.
Someone using phone with a orange and blue wifi graphics in the background

Blog

Your Guide to Pain Free Telecom Transformations

Considering a switch for your telecom services? Not sure where to start? If you are feeling overwhelmed by all the options, check out this guide to pain free telecom transformations for a smooth transition.

Blog

PCI Validated P2PE – The Simple and Safe Path to PCI Compliance

Many of our clients take payments from their customers using…

Blog

Mr. Jennings Goes to Washington…

We’re all targets for phishing, and you can imagine how attractive the Senate staffers would be! Mike briefly covered the various types of phishing, including Credential, Spear, Whaling and Business Email Compromise. He included examples and discussed how to spot each type.