CMS IP Technologies Blog
Cybersecurity Network Security News Resources

texas-electric-company-warns-of-scam-involving-losing-power

Read More
Thousands of Stolen Credentials Accessible via Google Search as Cybercriminals Accidentally Make Them Public
Network Security News Resources

Thousands of Stolen Credentials Accessible via Google Search as Cybercriminals Accidentally Make Them Public

A publishing goof by cybercriminals on a WordPress site made files containing stolen passwords indexable by Google and were subsequently...
Read More
Securing Remote Employees is the Top 2021 Cybersecurity Challenge for Organizations
Network Security News Resources

Securing Remote Employees is the Top 2021 Cybersecurity Challenge for Organizations

Security vendor CheckPoint provides insight into what are the organizational cybersecurity priorities for next two years, as well as where...
Read More
BEC Attacks Nearly Doubled in 2020
Network & IT Support Network Security News Resources

BEC Attacks Nearly Doubled in 2020

A new report from Barracuda Networks found that business email compromise (BEC) attacks have nearly doubled over the past year....
Read More
The Cost of Ransoms Demanded and Paid Double in 2020!
Network Security News Resources Uncategorized Virus Protection

The Cost of Ransoms Demanded and Paid Double in 2020!

According to new data from UK cyber insurer Beazley shows ransomware claims have increased materially and calls for organizations to...
Read More
7 Urgent Reasons Why You Need to Create Your “Human Firewall” As Soon As You Can
Network Security News Resources Uncategorized

7 Urgent Reasons Why You Need to Create Your “Human Firewall” As Soon As You Can

Read More
News Resources Uncategorized

CMS IP Technologies Hires David Dillion as Director of Managed Services

FOR IMMEDIATE RELEASE: September 2, 2020 Lea Burns CMS IP Technologies (603) 785-6804   CMS IP Technologies Hires David Dillion...
Read More
News Resources Uncategorized

CMS Has Partnered with KnowBe4: Providing Clients with a Comprehensive Cybersecurity Solution Named ThreatWatch

Read More
News Resources Software Uncategorized

Windows 7 and Server 2008 EOL

Read More
Resources VoiceWatch UC

Polycom VVX 400 Training

Getting Familiar with your Polycom VVX 400 Phone
Read More
Network & IT Support Network Security

The BYOD Scenario

BYOD (Bring Your Own Device) is a movement that has gained great speed within the last four years. With employees...
Read More
NEC Resources

NEC SV8100 In Mail Quick Reference Guide

Read More
NEC Resources

NEC Univerge SV9100 Multiline Quick Reference

Read More
NEC Resources

NEC Univerge SV9100 User Guide

Read More
In Mail Voicemail Setup
NEC Resources

In Mail Voicemail Setup

A quick guide to setting up your NEC In Mail Voicemail   Setup personal greeting: Press VSMG Press GREET Press...
Read More
NEC Quick Reference
NEC Resources

NEC Quick Reference

Quick Reference Guide for the NEC SV8100 & SV9100   Call ANOTHER EXT Lift handset or press SPEAKER key Dial...
Read More
The Dangers of Phishing
Network Publications Resources

The Dangers of Phishing

Phishing is an attempt to acquire sensitive information such as usernames, passwords and credit card details.Our newest publication will help...
Read More
Ransomware
Network Publications Resources

Ransomware

Fighting Ransomware Ransomware is becoming more frequent, don't let it catch you off guard.  Our publication, Understanding Your Network: Ransomware,...
Read More
Data Backups & Recovery; What to Look For
Disaster Recovery & Data backup Network & IT Support

Data Backups & Recovery; What to Look For

Local, On-site, Off-site, Cloud-based, Business Continuity....These are all terms for various types of data backups. And if you search online...
Read More
Protecting Your Network from Ransomware
Network & IT Support Virus Protection

Protecting Your Network from Ransomware

What is Ransomware? Ransomware is malware that holds the victim’s data ransom by preventing access to the computer by locking...
Read More
1 2

Thousands of Stolen Credentials Accessible via Google Search as Cybercriminals Accidentally Make Them Public

A publishing goof by cybercriminals on a WordPress site made [...]

By |2021-02-26T09:42:16-06:00January 27th, 2021|Network Security, News, Resources|Comments Off on Thousands of Stolen Credentials Accessible via Google Search as Cybercriminals Accidentally Make Them Public

Securing Remote Employees is the Top 2021 Cybersecurity Challenge for Organizations

Security vendor CheckPoint provides insight into what are the organizational [...]

By |2021-02-26T09:39:57-06:00January 8th, 2021|Network Security, News, Resources|Comments Off on Securing Remote Employees is the Top 2021 Cybersecurity Challenge for Organizations

The Cost of Ransoms Demanded and Paid Double in 2020!

According to new data from UK cyber insurer Beazley shows [...]

By |2021-02-26T09:30:39-06:00December 22nd, 2020|Network Security, News, Resources, Uncategorized, Virus Protection|Comments Off on The Cost of Ransoms Demanded and Paid Double in 2020!
Go to Top