Posts

Blog

Preparing for CMMC (Cybersecurity Maturity Model Certification)

CMMC is a certification that the government will require for…

Blog

Checklist - 2019 Technology Resolutions

Before you make your resolutions for 2020 we thought we would help you take a minute to tie up essential technology details from 2019. If you haven’t gotten around to these, put them at the top of your 2020 list!
Holding the door for hacker

Blog

Hacking Prevention - don't be a Hacker Helper

Cybercriminals are always on the hunt for easy access to your organization. Many times the easiest way in isn’t traditional hacking. Human hacking, more commonly known as social engineering, involves tricking an unsuspecting employee into giving hackers the access they need.

Blog

The Dark Web - A Scary Story

The Dark Web sounds frightening and it is. It is a place most of us will never visit – it can’t be reached via normal search engines such as Google or Bing.

Blog

PCI Validated P2PE – The Simple and Safe Path to PCI Compliance

Many of our clients take payments from their customers using…
Business woman using phone

Blog

How to protect your network while allowing BYOD

Bring Your Own Device (BYOD) policies are changing the business world for the better. With fewer overheads and greater working flexibility for employees, it may at first seem as though you cannot find fault with this approach. With our advice, you can adopt a BYOD policy and strengthen your network against attacks.
Businessman stacking blocks that spell out "BYOD"

Managed IT Services

5 steps to a solid BYOD policy

It’s increasingly common for employees to have their own devices – laptops, tablets, phones – at work; devices that they’re comfortable and familiar with. But BYOD policies can create some potentially dangerous situations for employers. Use these steps as you set up your BYOD policy.
risk assessment

Managed IT Services

6 things a good network risk assessment should include

A network risk assessment is one of the best ways to keep your network secure. It can identify vulnerabilities and allow you to fix them before cybercriminals exploit them or unwitting employees expose them. Here are 6 services a good assessment should include.

Videos

Blog

The Latest Phishing Trends - Video

Did you know that phishing via text is growing rapidly? The short webinar provides tips and examples of phishing threats so that you can go back to work better prepared!

Events

Blog

Cyber Threats to Your Business

The Reston Business Advisory Council presents Cyber Threats…