Thousands of Stolen Credentials Accessible via Google Search as Cybercriminals Accidentally Make Them Public
A publishing goof by cybercriminals on a WordPress site made files containing stolen passwords indexable by Google and were subsequently...
Read More
Securing Remote Employees is the Top 2021 Cybersecurity Challenge for Organizations
Security vendor CheckPoint provides insight into what are the organizational cybersecurity priorities for next two years, as well as where...
Read More
BEC Attacks Nearly Doubled in 2020
A new report from Barracuda Networks found that business email compromise (BEC) attacks have nearly doubled over the past year....
Read More
The Cost of Ransoms Demanded and Paid Double in 2020!
According to new data from UK cyber insurer Beazley shows ransomware claims have increased materially and calls for organizations to...
Read More
CMS IP Technologies Hires David Dillion as Director of Managed Services
FOR IMMEDIATE RELEASE: September 2, 2020 Lea Burns CMS IP Technologies (603) 785-6804 CMS IP Technologies Hires David Dillion...
Read More
Polycom VVX 400 Training
Getting Familiar with your Polycom VVX 400 Phone
Read More
The BYOD Scenario
BYOD (Bring Your Own Device) is a movement that has gained great speed within the last four years. With employees...
Read More
In Mail Voicemail Setup
A quick guide to setting up your NEC In Mail Voicemail Setup personal greeting: Press VSMG Press GREET Press...
Read More
NEC Quick Reference
Quick Reference Guide for the NEC SV8100 & SV9100 Call ANOTHER EXT Lift handset or press SPEAKER key Dial...
Read More
The Dangers of Phishing
Phishing is an attempt to acquire sensitive information such as usernames, passwords and credit card details.Our newest publication will help...
Read More
Ransomware
Fighting Ransomware Ransomware is becoming more frequent, don't let it catch you off guard. Our publication, Understanding Your Network: Ransomware,...
Read More
Data Backups & Recovery; What to Look For
Local, On-site, Off-site, Cloud-based, Business Continuity....These are all terms for various types of data backups. And if you search online...
Read More
Protecting Your Network from Ransomware
What is Ransomware? Ransomware is malware that holds the victim’s data ransom by preventing access to the computer by locking...
Read More
Who’s Looking Out for Your Network?
Today I want to talk about the importance of using a consistent IT services provider. Every business out there relies...
Read More