Trending IT Blog Articles:
The Essential Checklist for Securing Company Laptops at Home
Stop Ransomware in Its Tracks: A 5-Step Proactive Defense Plan
We figured it out
so you don't have to
Hot Alerts:
Artificial Intelligence VS. Human Decision-Making
Microsoft OneDrive Change: What SMB Leaders Need to Know (and Avoid)
The 2026 Hybrid Strategy: Why “Cloud-Only” Might Be a Mistake
Beyond Chatbots: Preparing Your Small Business for “Agentic AI” in 2026
Top Cybersecurity Challenges Facing New Jersey Businesses in 2026 (And How to Stay Protected)
Cyber Retaliation From Iran? Why U.S. Businesses Are on Alert in 2026
We know you are busy
Receive important IT and Security alerts via email and get a complimentary e-book, “Cybersecurity Essentials for Business Owners”
No worries. We keep you information private. You may cancel at any time.
For more information, see our Privacy Policy.
Recommendations for ensuring recovery and continuity in the face of the growing cybersecurity threats to SMBs
Businesses must prepare the front line of defense against ransomware attacks: your employees. Today’s companies must provide regular and mandatory cybersecurity training to ensure all employees are able to spot and avoid a potential phishing scam in their inbox, a leading entrance point for
SSL – what it means, how it works and where it is used.
If you want to run commercial transactions, or process your website’s data online securely, you need an SSL certificate for your website. Basically, it gives you the valid encryption for the website – and if you ever wondered what is the difference between domains
What is Email Spoofing and How to Identify It?
A “spoofed” email is essentially a “pretend” email when the sender deliberately manipulates the email’s headers to make the message appear as though it was authored by someone else. For example, you receive an email that looks like it came from your boss, from
Department of Homeland Security Phishing Scam
The National Cybersecurity and Communications Integration Center (NCCIC) is the Nation’s flagship cyber defense, incident response, and operational integration center. Its mission is to reduce the Nation’s risk of systemic cybersecurity and communications challenges. The Department of Homeland Security (DHS) has released a statement
Increased Office 365 Account Attacks
According to released information from Barracuda Networks, Microsoft Office 365 account takeover attacks are one of the most prevalent email attacks for the Office 365 platform. Barracuda states that approximately 29% of Organizations on Office 365 have had at least one account compromised by
Vulnerabilities Fallout: Not all fixed by Recent Microsoft Patch Releases
In a past month, Microsoft has released patches for over 70 vulnerabilities in its products. The company has been under the fire from users and system administrators for quite some time. The pressure was following the stream of vulnerabilities, including two of a zero-day
PHI of 350,000 DHS Clients Compromised in Phishing Attack in Oregon
The Oregon DHS recently disclosed that the personal health information (PHI) of over 350,000 clients had been compromised in data breach. A phishing URL embedded into the spear-phishing email was clicked by nine employees, resulting in granting cybercriminals the access mailboxes of nearly 2
Advanced Phishing Threat: malicious emails posing as Adobe Acrobat or Microsoft Office365 message
We have received numerous reports and examples today of an advanced phishing email being used to harvest Office365 credentials. The email is sent through a compromised account of an individual that is familiar, such as a colleague, business partner, vendor, etc. The attacker gets
58% of cyber attack victims were small businesses – you could be next
Cybercrime is a big and nasty business. According to Cybersecurity Ventures, small business (organizations with fewer than 250 employees) becomes a prevalent and profitable target: 58% of them were cyberattack victims in the recent year, and the astounding amount of $6 trillion is expected
FaceTime bug poses privacy threat for individuals and businesses using the app
9to5Mac has discovered a significant bug in FaceTime app, and the news is running virally over social and major media outlets. Reportedly, when users start group FaceTime, they can immediately hear the audio coming from their phone, regardless of the other person accepting or rejecting
773 million records of email addresses were breached – Have you been pwned?
Today, one of the largest data breach data sets was released containing roughly 773 million unique records of email addresses and passwords. Microsoft Regional Director and MVP Troy Hunt obtained the original data set, titled ‘Collection #1’ from a hacker forum. The original data
Important Alert: NEW Office 365 Phishing Threat
A new phishing attack is using fake non-delivery notification in an attempt to steal users’ Microsoft Office 365 credentials. These credentials will then be used to send messages from the users account, further spreading malicious emails and software. In this case, the attack begins
10% of you are compromised by at least one of the passwords from the Top 100 List of 2018
Each year, SplashData., Inc, a leader in password management, analyses leaked passwords to find the top commonly used passwords. In 2018, SplashData, Inc. had five million passwords to work from, most of them from hacks in the US and Europe. According to the statistics,
Sextortion: what you should know of this new email scam
Sextortion, yes that is correct, is a new twist on an old email scam in which the scammer has indicated that they have compromised you by accessing your computer via malware and recorded you or your household members in an intimate setting. They may
Top-Clicked Phishing Email Subjects
Think before you click! KnowBe4, a provider of security awareness training and simulated phishing attacks, has released statistics on the top 10 phishing email subjects that are opened by end-users. Drum roll please – the top 10 are: Password Check Required Immediately Security Alert
[VPNFilter] Symantec Releases Tool to Check for VPNFilter Infection
On May 23rd researchers at Cisco discovered an advanced malware, named VPNFilter, which targets routers and Network Attached Storage (NAS) devices in order to steal files, information, and examine network traffic as it flows through the device. More details can be found on the
Do You Have a Cybersecurity Program for Your Small/Medium Business?
As a small/medium business owner or manager, it is imperative that you have an awareness of cybersecurity related-risks and implement infrastructure and processes to mitigate those risks. According to Verizon’s 2018 Data Breach Investigations Report, 58% of breach victims are categorized as small businesses.
Update: additional info on advanced malware, named VPNFilter
On May 23rd 2018 researchers at Cisco discovered an advanced malware, named VPNFilter, that targets routers and NAS devices in order to steal files, information, and examine network traffic as it flows through the device. More details can be found on the powersolution.com blog
Increasing risk of CEO Fraud Emails – What to Know and How to Protect Yourself
Your phone dings or your email client puts up an alert – a message from the CEO. This must be important. You open it, scan it quickly, and there is a note asking to transfer a sum of money. The next decision you make
Information Technology in the Manufacturing Industry
IT has impacted the manufacturing industry in many different ways, making advancements throughout the vertical, from the infrastructure of factories to the facilities’ front-office processes. Information technology has impacted the relationship between suppliers, equipment manufacturers (OEMs), logistics, and end customers. In our continuously evolving
Violating HIPAA regulations is a Crime that Can Lead to Serious Penalties
Attorney generals and district attorneys around the country, are increasingly taking HIPAA violations seriously. Criminal charges for violating HIPAA are serious. You should know that the federal government can bring criminal charges against companies and company employees under the Health Insurance Portability and Accountability
Do you believe in coincidences? Take take a closer look at pi
There are many important numbers in the universal math. Primal, odds, evens, irrational. And then there is one to rule them all. A mathematical constant, the ratio of a circle’s circumference to its diameter… what we all know – or should know – as pi. The Babylonians
Why Use a Corporate VPN when connecting to your network
Most corporate IT networks have various security products on the network providing some level of security – a firewall, Antivirus software, backup, etc. Even with these protections in place, without a VPN, employees are only protected while they are on the corporate network. With
Phishing Emails – Everyone is at risk
Phishing emails usually appear to come from a well-known organization and ask for your personal information – such as credit card number, social security number, account number or password. Often times phishing attempts appear to come from sites, services, and companies with which you
Rising Business Costs in 2018: Fight Back By Outsourcing Your IT Services
Employers must always look for ways to counteract the ever-increasing costs of running their companies. 2018 won’t be any different. Once again it is rising cost environment for most SMBs. Health Care Costs Increase: Employers with healthy workforces often report a healthy bottom line
7 Must-Haves for a Secure Remote Access in Your SMB
Now that cloud technology has made access to information more convenient, with a promise to make your business life easier, the risk of data security has increased. Cloud servers are susceptible to attacks. Insecure or insecurely used remote access technologies – mechanisms that most security
How Downtime can Crush your Business
Did you know that 3 out of 4 SMBs fail the disaster recovery preparedness?According to the National Archives and Records Administration, only 10% of companies stay in business after experiencing 7 days of data center downtime. A third of all organizations have had some
Go beyond CTRL+C: here are 33 lesser-known shortcuts to help your workday
OK, we all know what CTRL+C and CTRL+V do. Throw in X and Z into the mix, and one may get comfortable using the keyboard. But did you know there are so many more shortcuts that can help you with your workload? It’s like
3 Important Rules to Follow for Public Cloud Security and Compliance
When using a public cloud host, you want to make sure your business remains compliant with rules and regulations applicable to your industry, while also keeping your data secure. To ensure the compliance and security, there are a few rules your SMB needs to
How to handle phishing attempts involving email scam [Screenshot]
Cybercrooks use clever schemes to defraud people every day. They often combine sophisticated technology with age-old tricks to get people to share personal information, send money or compromise access to their computer network. They use social engineering methods to convince people into doing things









