Category Archives: Security

What exactly is preventive cyber-security?

2017February15_Security_A

There has been a movement among technology providers to promise “proactive” cyber security consulting. Small- and medium-sized businesses love the idea of preventing cyber-attacks and data breaches before they happen, and service providers would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events. But it’s not always clear what proactive cyber-security means, so let’s take […]

Also posted in General Articles A | Tagged , , , , , | Comments closed

5 great ways to prevent cyber-attacks

2017February15_Security_C

As technology consultants, we’re stuck between a rock and a hard place. We want to provide our clients with enterprise-level IT, but that requires that we specialize in overwhelmingly intricate technology. Explaining even the most foundational aspects of our cyber-security would most likely put you to sleep before convincing you of our expertise. But if […]

Also posted in General Articles C | Tagged , , , , , | Comments closed

How can you go from reactive to preventive IT?

2017February15_Security_B

Shopping around for a managed IT services provider is tough. You’re looking for a business to manage extremely complex and delicate technology, so they can’t be expected to get into the nitty gritty details of DNS-layer security, intrusion prevention systems, and encryption in their marketing content. But one thing does need clarification: What exactly are […]

Also posted in General Articles B | Tagged , , , , , | Comments closed

Hackers use browsers to get credit card info

2017January27_Security_C_PH

Does filling in web forms sap all your browsing energy? Do you find it especially taxing to shop or register online using a mobile device? Google’s Chrome alleviated this dilemma when it introduced the Autofill feature in 2011, which made filling in forms much faster and making credit card purchases online more convenient. Unfortunately, it […]

Also posted in General Articles C | Tagged , , , , , | Comments closed

Chrome and Safari: hackers’ newest tools

2017January27_Security_B_PH

Filling out web forms often seems like an unbearably monotonous obstacle that gets in the way of online shopping, booking a plane ticket, and doing other types of online registration. With many of today’s transactions done online, people have become accustomed to relying on their browsers’ autofill function to save time. But being able to […]

Also posted in General Articles B | Tagged , , , , , | Comments closed

Browsers leak sensitive info to hackers

2017January27_Security_A_PH

The Autofill feature fills a void in the web browsing habits of many. It eliminates the need to enter all your details when logging on your social media accounts or when checking out your basket after e-shopping. On Chrome and Safari browsers, however, danger lurks when you rely too much on autofill. Without knowing it, […]

Also posted in General Articles A | Tagged , , , , , | Comments closed

Cyber security and managed services

2017january12_security_a_ph

Cyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business owners, other times it has proven to be a cautionary tale, one that small businesses can learn from to fend themselves from online threats that can leave devastating impact. What’s certain is statistics don’t lie, and as […]

Also posted in General Articles A | Tagged , , , , , | Comments closed

Managed services for cyber security

2017january12_security_b_ph

Ransomware, Trojan horses, spyware and malware are things small businesses like yours don’t ever want to come across. While the term cyber security was once thrown around to scare businesses into purchasing security software, today’s sophisticated threats can leave immense impact, something that antivirus solution alone can’t handle. With that in mind, we’ve rounded up […]

Also posted in General Articles B | Tagged , , , , , | Comments closed

Statistics for cyber security during 2016

2017january12_security_b_ph

As cyber attacks continue to rise, businesses large and small need to stay one step ahead with IT services that keep them protected no matter what. What once were minor nuisances have now become advanced threats that can actually put you out of business. In fact, these cyber attack statistics will prove to you that […]

Also posted in General Articles C | Tagged , , , , , | Comments closed

The ransomware that makes you sell your soul

2016december28_security_c_ph

Ransomware has become a fast-track for making money for some hackers this holiday season. But instead of just demanding a small payment for the decryption code that will unlock their computers, some hackers are demanding that victims sacrifice two other friends to ensure they receive the code they need. Read more to find out what […]

Also posted in General Articles C | Tagged , , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.