Ask A Pro: What is Multifactor Authentication (MFA)?
Topics: Cybersecurity, Internet, Multifactor Authentication, MFA, Physical Security
New Challenge, Life-long Passion Introducing Maggie Basgall
Many of you have had the opportunity to work with, listen to, or golf with Megan Keiswetter in the past. As Nex-Tech’s expert in all things marketing she did a great job representing the Nex-Tech Advertising Solutions team and we wish her well as she embarks on a new journey. Enter Maggie Basgall, who is taking over Megan’s role as Advertising Solutions Representative at Nex-Tech.
Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing
Cybersecurity—The #1 Threat Right Now and How Not to Fall For It
Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing
FCC Approves 988 as New Dialing Procedure to Reach National Suicide Prevention Lifeline
Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing
Kari's Law and Baum's Act. How Will it Affect my Business?
As some business owners and technology professionals may know, in February of 2018, President Donald J. Trump signed into law two statutes intended to improve emergency calling situations. These laws took effect on February 16, 2020, and may require changes and enhancements to customer's telephone systems and/or services.
Here are the details you need to know.
Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing
Topics: Nex-Tech, Network Monitoring, Carrier, Cybersecurity, NOC, CALEA, Security, Business, Tech Tips, Search Engine Optimization, Communication, cybercrime
Topics: Nex-Tech, Network Monitoring, Carrier, Cybersecurity, NOC, CALEA, Security, Business, Tech Tips, Search Engine Optimization, Communication, cybercrime
Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing
DON'T Do What You're Told (Until you know the request is real)
If you are like me, one of the first items you do each day is check your e-mail. Picture this, it is Tuesday morning and you have just poured your favorite drink and sat down at your desk. You open Outlook to see what fun things email has in store for you today.
Topics: Cybersecurity, Managed IT, Business, Technology, Budget, Phishing
How to Assess Physical Risk to Your Business—Five Steps to Get You Started
Let’s talk security. It’s everywhere, whether your business has 5 or 500 employees: encryption for your emails, surveillance cameras, or all the cloud services requiring multi-factor authentication. IT departments can’t get around it anymore, but it’s still a tough and complex conversation, especially when budget time comes.
Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing