OVER 35 YEARS IN BUSINESS
TECHNOLOGY EXPERTS
THE RIGHT PRODUCTS
THE RIGHT SOLUTIONS
Managed IT Services
Disaster Recovery
Network Consulting Services
System Architecture
IT Business Planning
On-Demand IT Outsourcing
Recent Blog Posts
Guarding Your Identity: Defending Against Browser Token Theft for Enhanced Security
In today’s online world, our browsers are more than just gateways to information. They hold the keys to our online identities, containing tokens that store our login credentials and grant access to sensitive data. Unfortunately, these tokens can also be stolen, leaving us vulnerable to online attacks. How Browser Token Theft Works Cybercriminals can steal…
FBI Warns of targeted COVID-19 Phishing
The FBI Cyber Division has recently released a warning regarding specific phishing emails attempting to harvest user’s credentials by presenting fake login pages for Office 365 and other online accounts. As always, be cautious about any link you click in an email, text message, or social media post. If you’re not sure if a link…
Working from home – Safely and Securely
Remote Access Security Fundamentals As everyone continues to deal with changes and restrictions due to COVID-19, many businesses have transitioned to a work-from-home model as a way to continue operations. Some busineses are using VPNs to allow direct connections for remote workers, others are using tools such as Splashtop, Microsoft remote Desktop, or Cisco Webex.…