Tag Archives: cybersecurity

Cybersecurity tips for working remotely

Remote work policies have become a necessity not just because of the current coronavirus crisis, but also for the ways they improve a company’s bottom line and efficiency. Yet despite remote work’s benefits, it leaves you and your company exposed to online scams and other cybersecurity threats. To defend your company and your remote workers, […]

Don’t forget about security while working from home

man working from home office

A short while ago, we discussed preparing and testing a Remote Work Plan as COVID-19 was becoming more prevalent. The time for planning is now past and most businesses that can support home workers should already have that plan in operation. The Home Workstation Probably the most important aspect of working from home is making […]

Cyber attacks are evolving. Make sure your technology does too. By Tim Coach, RESULTS COO

Cyber attack mitigation

In 2020, it will be more important than ever to keep up with what’s affecting technology and the small business. Most cyber attacks occur because of weak, outdated technology that can’t keep up with the latest ransomware, virus, malware or phishing scheme.

Keeping your nonprofit safe from cyber attack

non-profit image

2020 is in the past (good riddance!). Although 2021 is bound to be better, one thing is likely to remain unchanged… cyberattacks. Nonprofits are generally considered low-hanging fruit because they often lack the time and financial resources to keep up-to-date with the latest cybersecurity advice. This year, commit to doing what is necessary to protect […]

Ransomware is like the flu … it’s constantly evolving

Person blowing his nose in another persons face

More and more, ransomware has emerged as a major threat to individuals and businesses alike. It’s distributed in a variety of ways and is difficult to protect against because, just like the flu virus, it is constantly evolving.

Join RESULTS & the FBI to discuss cybersecurity

Data safety shielf

Join RESULTS Technology for our final Small Business Event of the year and enjoy lunch on us as we present Cyber Security for the Kansas City Business. Our speaker for this event is FBI Special Agent George Schultzel. He will discuss topics on what cyber crime looks like, how small businesses are targeted, and what […]

RESULTS Technology Joins National Cybersecurity Initiative

2019 Cybersecurity Awareness Month

RESULTS Technology has joined the National Cybersecurity Awareness Month (NCSAM) initiative, held annually in October, by signing up as a Champion and joining a growing global effort to promote the awareness of online safety and privacy. NCSAM is a collaborative effort among businesses, government agencies, colleges and universities, associations, nonprofit organizations and individuals committed to […]

Cybersecurity can be daunting…but there’s light at the end of the tunnel.

Cybersecurity

We hear a lot of talk about data security because of the constant threat of cyber attacks and hacking. News of data breaches are extremely common. You may find yourself dwelling on the threat … what would you do in the event of a disaster? How would you access your data? Luckily, there is a […]

Free removal of ransomware? Yes, it’s a real thing.

Hacker taking data from a business person

Over the last few years, different versions of ransomware have sprung up, all aimed at extorting money from your business. Before you even consider paying for the release of your data, the first thing you must always check is if there’s a free cure for the ransomware that infected your systems. The state of ransomware […]

Hackers are attacking MSPs. Here’s what we’re doing about it.

Hacker taking data from a business person

If you’ve been reading the news lately, you know that more than 20 Texas municipalities were recently infiltrated by hackers demanding, collectively, a $2.5 million ransom causing some of these entities to temporarily cease all operations and pay the demanded ransom. Investigators have identified that the single hacker gained access to the various networks through […]