How to Check if a Company is Legitimate

In today’s complex digital environment, it’s essential to take your time to research every single company that you’re interested in doing business with.  Whether you’re a small business or a big enterprise, the consequences of dealing with an illegitimate company are always harmful. For instance, let’s say that a young startup signed a contract with […]

How to Check if a Company is Legitimate Read More »

Are You Ready for a Cyber Attack? Part 1 of 2

Are You Ready for a Cyber Attack? Part 1 of 2 One of Mission Critical Systems partners, KnowBe4, recently shared a presentation with us on how serious the need for good cybersecurity has become. The sophistication of attacks has really taken a dramatic step forward in just the past eight to nine months- right when

Are You Ready for a Cyber Attack? Part 1 of 2 Read More »

FBI has issued attack warning for healthcare providers

There is a credible threat of a major attack from Russia coming against healthcare providers, in the form of network hijacks paired with ransomware. Please warn any clients in that space, make sure their systems and firewalls are all patched to the latest versions, and once again remind them that their staff are the weakest

FBI has issued attack warning for healthcare providers Read More »

Ransomware: Protection and Recovery

Denver IT Protection Ransomware, the breed a malicious software that takes your computer hostage by encrypting files and demanding a ransom payment to unlock them, continues to be the scourge of computer networks everywhere. In the past month, ransomware attacks were carried out on a massive scale, including attacks on the Colorado Department of Transportation

Ransomware: Protection and Recovery Read More »

Meltdown and Spectre

Last week, the technology world was shaken by the announcement of two flaws that reach deeply into modern computer architecture and affect just about every operating system and device in use now. The two flaws, named Meltdown and Spectre, are both caused by the way the hardware processor interacts with the operating system on every

Meltdown and Spectre Read More »

Local Admin Blues

One of the most prevalent security risks we encounter is setting users to be local administrators on their workstations. This is usually set up because some important software application requires it, or users need the ability to make certain changes to their workstations – like changing wifi networks or adding printers. While setting a user

Local Admin Blues Read More »

Turning the tables on technology performance

Turning the tables on technology performance Technology performance is typically touted as a conduit to better business processes. However, sometimes lost amid all the high-tech hoopla is a high-touch catalyst for performance excellence. It’s called action learning. Simply put, action learning is interactive training, that time-tested practice of learning by doing. No matter how robust

Turning the tables on technology performance Read More »

Help Desks play key strategic, as well as problem-solving, role

Help Desks play key strategic, as well as problem-solving, role Ask people to define “Help Desk,” and most will discuss the tactical role of resolving acute problems. But there’s a much more strategic role that a Help Desk can fulfill: Identifying issues within individual companies or with particular products and services that may merit major

Help Desks play key strategic, as well as problem-solving, role Read More »

FREE – Risk Assessment

Identify your organization’s risks and receive guidance on how to mitigate those risks – FREE!

Learn more >

Scroll to Top