BLOG
Top-Clicked Phishing Email Subjects: Q2 2020
Phishing emails that look like they are coming from LinkedIn continue to be at the top of the list.
World Day Against Trafficking in Persons
We’ve partnered with Breaking the Chains, a local organization fighting human trafficking, to honor World Day Against Human Trafficking on July 30.
Outsourcing Vs. Insourcing Your IT
Businesses should carefully review the pros and cons of both insourcing and outsourcing their IT to determine the best option for their unique needs.
Servers, Gigabytes, and... Nerf Guns?
If you’ve spent any time on our website or social media pages, you’ve likely seen a photo of our entire team holding Nerf guns. Here’s their story.
Should You Adopt a BYOD Policy?
BYOD policies have become quite popular in recent years. But, they are not always right for every organization. It’s important to consider the pros and cons, and decide if a BYOD policy makes sense for your business.
What's That Term?: Multi-Factor Authentication
Multi-factor Authentication. You’ve likely heard this term, and it’s even more likely that you’ve utilized this security measure.
Lessons Learned in the Transition to Remote Work
Living through what many are calling ‘the great remote work experiment’ has led to several key lessons for managers, business owners, and IT professionals.
5 Common COVID-19 Cyber Attacks
Hackers are ruthlessly exploiting coronavirus fears with pandemic-related scams, phishing and malware campaigns.
Top-Clicked Phishing Email Subjects: Q1 2020
Last quarter, Coronavirus-related phishing email attacks were up 600%.
What's With the Rocks?
If you’ve ever visited our office, you may have noticed several rocks inscribed with the Kotman ‘K’ on people’s desks. What’s the deal with those?