Blog

Two-step and two-factor authentication: What’s the difference?

Woman typing on her tablet

Every business should have a strong cybersecurity posture to keep cybercriminals from infiltrating their network. One way to do this is by implementing a strict authentication process using two-step or two-factor authentication. These two processes are so similar that many confuse one with the other. Learn the difference between the two and how you can […]

Choosing the right computer for your small business

Person typing on their laptop with other stuff on the table

With the rise of eCommerce and remote working, the importance of computers in business has never been more apparent. But what kind of computers does your small business need? Should you invest in desktops or laptops? Consider the following when weighing your options. Portability The pandemic has driven the majority of businesses to adopt remote […]

Your company needs a cybersecurity expert

Internet security

With the prevalence of cyberattacks on companies of all sizes these days, businesses cannot afford to relegate cybersecurity to the bottom of their budget priorities. When it comes to cybersecurity, even small businesses should partner with a managed IT services provider (MSP). Here’s why it’s crucial to partner with an MSP that can implement robust […]

The Year in Review – Cybersecurity in the Year of the Pandemic

Person typing on computer with a lock above them

2020 was a year like no other in recent memory. For years, regulators have required that annual Risk Assessments include rating the risk of pandemics… now we know why. Banks, like all businesses were largely caught by surprise with minimal plans in place when the shutdown happened. Because banks are required to provide essential services […]

Cybersecurity: It’s time to make this a priority

Data security features

With so much going on with ransomware and data breaches, RESULTS Technology has decided to focus yet another monthly newsletter solely on cybersecurity education. At the time of this writing, there are at least 3 high-profile cybersecurity incidents in the news, including attacks on hospitals, retailers, and political groups. If you think having antivirus and […]

Don’t be a stepping stone for this cyberattack

stepping stones in water

A trend that has dramatically shifted in this pandemic is that cyber attackers are now taking their own sweet time to launch threats against businesses. They are using sophisticated, systematic cyber attack programs that continue for an extended time (called APTs) and small businesses are being used as stepping stones.

The pitfalls of business continuity planning

Business Continuity

If you have been using the same business continuity plan (BCP) for years, your organization may be in trouble. BCPs should continuously be updated so you avoid overlooking or underestimating certain issues. Not updating your BCP is just one mistake that can harm your business. Here are a few more you should avoid. Over-optimistic testing […]

DCI Partners with RESULTS Technology to Deliver Unique Cybersecurity Tool to Banks

Invicta security for banks

LENEXA, KAN., Sept. 21, 2020 –Data Center Inc. (DCI), the privately-owned developer of iCore360® core banking software and related technologies for community financial institutions nationwide, announced today they will be partnering with RESULTS Technology, the award-winning technology services firm specializing in the banking industry to provide a robust cybersecurity tool to its banking clients.

How to be proactive with your cyber defenses

User security

As soon as you focus on preventing downtime events instead of reacting to them, the productivity and efficiency of your IT infrastructure will increase to levels you’ve never dreamed of. It is good to have an IT team and/or a third-party partner like a managed services provider (MSP) that helps keep your company protected against […]