Cybersecurity is one of the most overlooked but important aspects when running a small business. It’s hard enough that you have to worry about all your other costs, like payroll and supplies; why a…
SOC compliance is a term you might find floating around the internet and particularly in the information technology space. The abbreviation stands for “system and organization controls” complianc…
Have you ever wondered why ransomware is such an issue? It’s because people are still falling for it!
Ransomware has become more complex and sophisticated in order to steal data from businesses,…
If you are a remote worker or occasionally work from home, you have probably used one or more of the three common methods for gaining remote access to the office.
Many companies just take the bui…
When you are having issues with your internet, sometimes it makes sense to wait it out. But what should you do if you experience a persistent issue or need your internet to work from home?
Chris s…
Have you noticed that cell phones, laptops, and wireless routers seem to get faster every year?
Why is that?
This is due to a technology called "wireless Multiple Input Multiple Output" or for …
Cybercrime is one of the most costly and dangerous threats to small businesses. If you have business insurance, that means you’ve already taken a step in the right direction but will your policies …
When you are putting together a cybersecurity plan for your business you must consider the three pillars of cybersecurity: People, Process, and Technology. Most businesses will invest in the technolo…
Do you know the difference between a private and public network? Which type does your business need? Petra Technologies’ CEO Chris Cummings gives us an overview of three types of networks, their di…
Are hackers lurking in your inbox? Would you even know if they were?
BEC stands for Business Email Compromises, which is a broad term for when a hacker gets access to your business email account,&…
If you work in an office or are a business owner, I’m sure you’ve gotten a prompt from your computer to download the latest update. Let’s face it, most people don’t want to take time out of t…
File sharing through email is a frequent occurrence in most businesses, but have you thought about how secure your methods might be?
The solution: a cloud-based file sharing method with extra laye…
Does your backup plan need a backup plan? If you are familiar with or use cloud backups for your personal or business needs, you are already on the right track!
Having your backups in another loc…
Every good information security program is based on three essential principles: confidentiality, integrity, and availability.
One of the most common-sense security methods an organization can use …
When it comes to the Internet of Things (IoT) you must be careful to consider the pros and cons. While it can be convenient to control your home’s temperature or alarm system through an app, you ha…
Have you ever wondered how the internet figures out how to pull up the website you type in? This function is called the DNS or domain name services, which functions like the "white pages" of the inte…
In today’s business environment, cybersecurity should be a priority for all businesses—no matter the size. Over the past few months, we’ve covered each item on the Cybersecurity Essentials list…
When you begin using cloud applications, it is easy to get excited and immediately begin using the application for your business. However, it is imperative to set up the existing security features to…
Does your business have a patch management plan? If you answered “no” you’re not alone. Most workplaces leave it up to fate, rely on built-in failsafe features (like when your computer automati…
If you aren’t concerned about the latest malware variants… you should be.
With record-breaking increases of never-before-seen malware variants being detected every month, it’s more important…