Well, why does the webcam need to be on?
Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing
DON'T Do What You're Told (Until you know the request is real)
If you are like me, one of the first items you do each day is check your e-mail. Picture this, it is Tuesday morning and you have just poured your favorite drink and sat down at your desk. You open Outlook to see what fun things email has in store for you today.
Topics: Cybersecurity, Managed IT, Business, Technology, Budget, Phishing
How to Assess Physical Risk to Your Business—Five Steps to Get You Started
Let’s talk security. It’s everywhere, whether your business has 5 or 500 employees: encryption for your emails, surveillance cameras, or all the cloud services requiring multi-factor authentication. IT departments can’t get around it anymore, but it’s still a tough and complex conversation, especially when budget time comes.
Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing
An Interview With Nate Rohleder On the State of Physical Security
Nate Rohleder is the Security Solutions Representative at Nex-Tech. He works with business customers to design video surveillance, electronic access control, and alarm systems to meet their individual security needs. With 10 years of sales and technical design experience, he is an expert in the fast-paced security industry.
Olga Detrixhe: Hi Nate, good to have you. Your working world revolves around physical security. Tell us what that means to you and why you are passionate about it?
Topics: Network Monitoring, Carrier, NOC, CALEA
Monitoring Generator Fuel Usage Results in Savings for Nex-Tech
Nex-Tech is no different than most Telcos, and performs generator run tests on a regular basis. This practice ensures generators are within operational standards in the event of a power outage. During these tests, we have seen our share of generators fail. Common failures are not starting as scheduled, not turning off after the run test, or even running low on fuel. These can result in network downtime in the event of a power outage.
Documenting generator information has become a regular practice for us over the years and the data can often lead to the detection of issues.
Topics: Network Monitoring, Carrier, NOC, CALEA
Topics: Nex-Tech, Advertising Solutions, Network Monitoring, Carrier, Cybersecurity, NOC, CALEA, Security, Business, Tech Tips, Search Engine Optimization, Communication, cybercrime
Topics: Advertising Solutions, Cloud phone, Cybersecurity, Security, Business, SecureIT, Tech Tips, Communication, cybercrime, Phishing
Funny Memes or Phishing, Identity Theft and Exploitation?
The article Funny Memes or Phishing, Identity Theft and Exploitation? was published online by TK Business Magazine, Topeka, on April 30, 2020.
We have all noticed a surge in funny Facebook memes and games while sheltering in place during the COVID-19 pandemic. They are so clever and ridiculously tempting to click-and-share or click-and-play along. But here is the rub. There is an increased likelihood that clicking, playing, and entering information really just opens the door wide open for cyber predators to get your information. Read the full article.
Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing
Cybercrime is everywhere. We know it and you know it, but deep down, many of us still think we’re either too small or unimportant to be a target. Think again. You were never safe from cyber criminals, but when the new year rolled into March and COVID-19 became the only news, your small business moved to the front of the cyber criminal’s hack-line.
Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing