INFORMATION TECHNOLOGY FOR SMBs

Our blog articles archive includes it security tips, cybersecurity alerts, state of IT reports, and tips on information technology for small and medium size businesses.

Reopening the Workplace After COVID-19: Technology Considerations

Returning to your establishment doesn’t necessarily mean you will be abandoning all of your Work From Home (WFH) set-ups. In fact, for most of you, your workforce will likely consist of remote workers for some time to come. In addition, workstations in your establishment may have been sitting idle while everyone worked remotely. Your technology goal is to ensure your employees have what they need to do their jobs effectively while you ensure and maintain a safe and secure work

Read More »

Benefits of letting your employees work from home

In the last several years, the concept of Work From Home (WFH) has become increasingly more popular. Though some still remain skeptical, it has been gaining in popularity and become more widely accepted among management circles. That said, the pandemic event in 2020 essentially set the debate entirely aside, at least for the time being, because WFH became the only choice between working and shutting down. Aside from mandatory quarantines, why have organizations been adopting WFH policies? There are several

Read More »

Increase in Business Productivity Phishing Scams

The New Jersey Cybersecurity & Communications Integration Cell (NJCCIC), in which powersolution is a member of, issued an alert around a new email threat. Cyber criminals are using fake business productivity suite emails to harvest credentials. Emails are mimicking SharePoint Online, One Drive, Drop Box share notifications as well as an awaiting message in Teams or SLACK. A sample of a fake email is below: The way organizations conduct business and how users access corporate networks, resources, and data have

Read More »
BYOD and Human Resources: Issues to Consider

Management Concerns About Work From Home Policy

1. Decrease in productivity A common concern is that when at home, where there may be many domestic or entertainment distractions, workers will be unable to settle in and focus on their work. Kids, pets, laundry, Netflix, etc. may represent a strong magnetic pull from the work at hand. 2. Oversight Many managers fear that without onsite management ensuring that work is getting done, employees will slack off. Accepting or not accepting Work From Home (WFH) policy for this reason

Read More »

Work From Home Implementation: Policy Considerations for Small Business

In the last several years, the concept of Work From Home (WFH), also known as Telecommuting, has become increasingly more popular. Though some still remain skeptical, it has been gaining in popularity and become more widely accepted among management circles. That said, the pandemic event in 2020 essentially set the debate entirely aside, at least for the time being, because WFH became the only choice between working and shutting down. WFH is a fairly general term that encompasses a range

Read More »

Data Security: What Can You Do To Mitigate Risk

Data security is important, but one main facet of data security is accessibility. Safe data is of no use to anyone if it becomes inaccessible. So as you make plans to defend against events that could threaten data security; plan to defend against events that would limit the use of that data to conduct your daily business operations. Take a holistic approach to data from the perspective of the customer. Remember, anything which affects data usage to meet your customer’s

Read More »

4 Common Threats to Your Data

There are numerous ways data can be put at risk. A number of different events will have an impact on customers and pose a threat to your brand, as well as your ability to provide services.   1. External Bad Actors – Clearly, this is the risk that gets the most headlines. Cyberattacks from hackers, foreign governments, and entities with bad intentions are a serious, ongoing threat. Ransomware viruses, for instance, are data kidnapping schemes that freeze access to your

Read More »

How To Setup Your Workforce With a Secure Remote Access

COVID-19 pandemic made working remotely the new norm. Because of advances in mobile and networking technologies, employees are increasingly working from various locations, connecting to their offices online. This ability to work from anywhere can be a great benefit for employees who are looking for work-life balance as well as organizations that are committed to hiring the best talent regardless of their location. But all that flexibility also warrants security threats. Your employees’ technology – especially Bring Your Own Devices

Read More »

How To Implement a Business Continuity Plan

Business continuity recovery plans can help businesses realize the following benefits: Ensure the highest level of data security Enhance business resiliency and maintain reputability Achieve maximum availability of mission-critical data Maintain continuity of business operations even in the harshest scenarios Have processes in place to minimize recovery time after a disaster Considering all these advantages, safeguarding business assets with business continuity planning is critical for every organization. Companies need to rethink their IT infrastructure and deploy reliable solutions that utilize

Read More »

Multiple Active Phishing Campaigns Targeting O365 Credentials

Multiple phishing campaigns have been identified targeting Microsoft Office 365 (O365) users in an attempt to steal login credentials. In one of the campaigns, the phishing email mimics an automated official notification from the Outlook team on behalf of the recipient’s organization. The email urges recipients to upgrade Outlook services within 24 hours to avoid a delay in receiving emails and contains an embedded link to the convincing spoofed login page. If the link is clicked and credentials are entered,

Read More »

Penetration Tests Demonstrate Passwords are Still a Security Problem

Passwords continue to be a top security challenge for organizations, with penetration testers revealing that they can easily guess passwords in the majority of their engagements, according to the 2019 Under the Hoodie report published byRapid7. The new report, which documents the results of 180 pen tests carried out from September 2018 through May 2019, highlights the most common external and internal cybersecurity weaknesses present in companies. Sample findings showed that password management continues to be a problem. In 72%

Read More »

Do You Have a Cybersecurity Program?

As a small/medium business owner or manager, it is imperative that you have an awareness of cybersecurity related-risks and implement infrastructure and processes to mitigate those risks.  According to Verizon’s 2018 Data Breach Investigations Report, 58% of breach victims are categorized as small businesses.  Roughly 75% of these breaches are perpetrated by outsiders, while approximately 25% of from insiders. Some of the techniques utilized to breach computer systems include hacking, malware (malicious software), social attacks, inappropriate privileges, malicious errors, and

Read More »