Loading Events

6 Cool Things You Can Do in Teams Today!

Register here for direct invite:

    Share:

    Facebook
    Twitter
    LinkedIn
    On Key

    Related Posts

    Keeping Children Safe On The Internet

    The Top 10 Ways to Keep your Kids Safe Online It is back to school time! If you are like me, your child may come home with a Chromebook or do all assignments online. What better time to discuss cyber safety with them! The internet helps our kids grow and learn like no other tool in history. But as with any tool, kids need to learn to use the web safely to get the most of it; they need to

    It’s a win-win for Maryland small businesses: Lower taxes and cybersecurity

    As we make our way through the summer and into the final quarters of the year, you might be looking at all the IT projects you have left to tackle and figuring out how to make your IT budget dollars go farther.  In Maryland, that opportunity exists through the Cyber Tax Credit, with the added benefit of enhanced cybersecurity.  It’s a win-win scenario.  Maryland’s General Assembly made available tax credits as an incentive to help small employers reduce their vulnerability

    Prime Day Threats Identified

    A new threat alert has been identified that is aiming to take advantage of Amazon’s upcoming Prime Day! As Prime Day approaches on July 11-12, Consumer Affairs has been compiling a log of those scams that they have seen directed to take advantage of online shoppers looking for a good deal.   The scams identified are: SMS messages from scammers say that due to your account security issue, you need to log in via the fake URLs on the message.

    3 Steps to Zero Trust Cybersecurity for Small Businesses

    3 Steps to Zero Trust Cybersecurity for Small Businesses Cyberattacks are becoming more rampant, and each year grow increasingly in sophistication. In 2022 it was estimated that every 39 seconds, a business fell victim to a cyberattack. Successful attacks amounted to an average of $4.32 million in losses! Something as simple as a gap in your network security could cause a chain of events that could prove catastrophic for your business. Within six months of a breach occurring, 60% of

    Folders labeled with Policy

    Security Policy

      What are Security Policies and Why do you Need Them?   One of the most critical services your MSSP (Managed Service and Security Provider) can provide is to identify your greatest risk areas for a security data breach. Typically, your biggest vulnerabilities are not only within your IT environment, but in the processes, policies, and procedures that can leave you open to phishing and social engineering attacks. Companies need to create IT policies for a variety of needs: disaster