
Cost Reduction Series: Episode One – The Value of Outsourcing
As the IT space (and business in general) has modernized over the past 20 years, we’ve seen people make a variety of decisions that are understandable, but unnecessary and expensive.
As the IT space (and business in general) has modernized over the past 20 years, we’ve seen people make a variety of decisions that are understandable, but unnecessary and expensive.
The Seattle times reports that Washington state has lost “Hundreds of Millions of dollars” to unemployment fraud amid the surge in claims due to coronavirus. Attentus alone has caught several
We’ve spent a lot of time talking about the realities and dangers around phishing attacks and social engineering scams. By now you should know that these attacks are heinous attempts
When it comes to cybersecurity, employee training is a step that many employers neglect or undervalue. Too many companies think that installing a suite of antivirus and anti-malware software is
“If you can’t hire a team internally, you should outsource one.” Today we are living during an unprecedented time. Our world has become a place where people cannot congregate towards
Social engineering is a term that’s become more well-used in recent years, and its one everyone with a computer should be familiar with as remote work becomes the norm.
At the time of this writing, the coronavirus outbreak has struck fear into the hearts of people worldwide. People are scared to go into crowded public places, or go outside
Anyone can be a victim of phishing—from you at your personal computer, to the largest corporations and organizations in the world. Knowing that 90% of successful hacks or data breaches
We’ve all heard talk of phishing scams and social engineering attacks—devious new ways for hackers to get access to our personal information. But what are they exactly? What is a
As an organization or company, you likely outsource your IT security to a group or team of professionals that help you plan out and manage your IT needs. This can
You may have heard the buzz about Windows 7 reaching its End of Life date, and the risks associated with the continued use of an obsolete operating system (OS). Essentially,
If you think large companies and government organizations are too secure for cybersecurity attacks or that your small business is safe, think again. Although uncommon, there have been some recent malware