Posts

Blog
Preparing for CMMC (Cybersecurity Maturity Model Certification)
CMMC is a certification that the government will require for…

Blog
Checklist - 2019 Technology Resolutions
Before you make your resolutions for 2020 we thought we would help you take a minute to tie up essential technology details from 2019. If you haven’t gotten around to these, put them at the top of your 2020 list!

Blog
Hacking Prevention - don't be a Hacker Helper
Cybercriminals are always on the hunt for easy access to your organization. Many times the easiest way in isn’t traditional hacking. Human hacking, more commonly known as social engineering, involves tricking an unsuspecting employee into giving hackers the access they need.

Blog
The Dark Web - A Scary Story
The Dark Web sounds frightening and it is. It is a place most of us will never visit – it can’t be reached via normal search engines such as Google or Bing.

Blog
PCI Validated P2PE – The Simple and Safe Path to PCI Compliance
Many of our clients take payments from their customers using…

Blog
How to protect your network while allowing BYOD
Bring Your Own Device (BYOD) policies are changing the business world for the better. With fewer overheads and greater working flexibility for employees, it may at first seem as though you cannot find fault with this approach. With our advice, you can adopt a BYOD policy and strengthen your network against attacks.

Managed IT Services
5 steps to a solid BYOD policy
It’s increasingly common for employees to have their own devices – laptops, tablets, phones – at work; devices that they’re comfortable and familiar with. But BYOD policies can create some potentially dangerous situations for employers. Use these steps as you set up your BYOD policy.

Managed IT Services
6 things a good network risk assessment should include
A network risk assessment is one of the best ways to keep your network secure. It can identify vulnerabilities and allow you to fix them before cybercriminals exploit them or unwitting employees expose them. Here are 6 services a good assessment should include.
Videos

Blog
The Latest Phishing Trends - Video
Did you know that phishing via text is growing rapidly? The short webinar provides tips and examples of phishing threats so that you can go back to work better prepared!
Events

Blog
Cyber Threats to Your Business
The Reston Business Advisory Council presents Cyber Threats…