by Robert Wentzell | Jan 16, 2026 | Blog
Guest Wi-Fi is a convenience your visitors expect and a hallmark of good customer service. But it’s also one of the riskiest points in your network. A shared password that’s been passed around for years offers virtually no protection, and...
by Peter Casserly | Aug 21, 2019 | Blog
As more businesses are migrating to Microsoft Office 365, it’s made more obvious the vulnerabilities of its configuration. Also, the fact that smaller organizations do not have dedicated IT teams, makes it easier for hackers to exploit the gaps and compromise their...
by Peter Casserly | Aug 5, 2019 | Blog
Nowadays, small businesses are tasked with the responsibility of ensuring that their systems are not the victim of a cybersecurity attack. Statistics point to the fact that hackers don’t just target big businesses. In fact, ransom-seeking cybercriminals will...
by Peter Casserly | Jul 4, 2019 | Blog
Printers, along with every other piece of equipment that is on your network, require careful configuration and regular upkeep to ensure that they aren’t putting your data and users at risk. Security researchers recently discovered two massive vulnerabilities in HP...
by Peter Casserly | Oct 12, 2018 | Blog
Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how...