Dec 11, 2020 | Technology
In the age of work from home and remote computing, cyber criminals are looking for new and innovative ways to infiltrate organizations and steal their precious data. One of the most recent methods is though your mobile devices on your home network. Since we now...
Dec 10, 2020 | Technology
If your idea of cybersecurity is a firewall and anti-virus then your organization could be at extreme risk. Firewalls and other preventive forms of cybersecurity are effective at preventing basic cyberattacks. However, over the past decade it has become clear that...
Nov 10, 2020 | Technology
SECTION 179 Details Many business owners are unaware that the acquisition of equipment under a $1 purchase option lease or Equipment Finance Agreement (EFA) qualifies for the tax break provided under Section 179 of the Internal Revenue Code. Subject to limitations,...
Oct 14, 2020 | Cyber Awareness, Technology
Taking an active and conscious role in securing your internet-connected devices is greatly important to protecting your identity and proprietary information. The first two weeks of Cybersecurity Awareness Month highlight the ways in which internet-connected devices...
Aug 7, 2020 | Cyber Attack, Technology
Business Email Compromise (BEC) Imagine your CFO or Controller having a compromised email account. This could become a huge problem for your organization. The cyber criminal will work in the background to monitor the email box and watch the passing conversations. ...
Apr 9, 2020 | Cyber Attack, Technology
The world is slowing down during this COVID-19 pandemic. We’re told to quarantine or self-isolate and not engage in groups. But there’s one group that’s not slowing down at all, cyber criminals. Cyber criminals and hackers will turn a global crisis into an opportunity...