blog

learn more about how you can achieve your business’s
goals through information technology.

subscribe to our blog

Benefits of Changing Your Password Regularly

Image of EJ Phillips
EJ Phillips

The benefits of changing your password often cannot be underestimated. Your...

Read more

Top Ten Tips for IT Security

Image of Tatiana Humphrey
Tatiana Humphrey

The internet can be the wild west, with the threats of malware, ransomware, ...

Read more

RepProtect

Image of EJ Phillips
EJ Phillips

The following 2020 statistics are sobering: 

  • US organizations face the...
Read more

Whitelisting vs Blacklisting: What’s the difference & why does it matter?

Image of Alesha Chapman
Alesha Chapman

Whitelisting and Blacklisting are two main approaches to protecting your network from dangerous...

Read more

What is a Firewall?

Image of Derrick Lopez
Derrick Lopez

A firewall is security software that runs on a physical, virtual, or cloud-based device. It is...

Read more

Malware and Computer Worms

Image of Carson Kosco
Carson Kosco

Malware is malicious software that gains access to your computer to cause harm and destroy your...

Read more

What is Ransomware?

Image of Paul Thrasher
Paul Thrasher

Ransomware is a type of malicious software, or malware, that prevents you from accessing your...

Read more

Phishing Scams and How to Avoid Them

Image of Stephen Roberts
Stephen Roberts

Phishing scams are rampant in today’s world and are of particular concern to those concerned...

Read more

Hacking And How to Prevent It

Image of Andrew Blais
Andrew Blais

Hacking refers to activities that seek to compromise digital devices, such as computers,...

Read more

What is IT Security?

Image of EJ Phillips
EJ Phillips

IT security is a set of strategies designed to prevent unauthorized access to organizational...

Read more