Understanding IoT Devices and Potential Security Risks

troysolisSecurity, TechnologyLeave a Comment

The Internet of Things, or IoT, is a growing number of devices that can connect and communicate with one another over the Internet and which can be remotely monitored and controlled. Although IoT’s roots date back to 1982, it wasn’t until 2008-2009 that the number of “things” connected to the Internet officially surpassed the number of people connected to the … Read More

How to Avoid the Phishing Net!

troysolisSecurityLeave a Comment

Cybercrime is a lucrative industry. In 2018, it grossed over $1.5 trillion dollars and is expected to cost over $6 trillion by 2021, according to the Official Annual Cybercrime report. Where there is money to be made, legal or not, there are people eager to make it. Phishing is one of many cybercrimes that scammers are pursuing…and they’re largely succeeding. … Read More

Why Managed IT Services Are So Important to Small Businesses

troysolisCloud Solutions, Security, TechnologyLeave a Comment

Traditional IT tech support is becoming more irrelevant as managed IT services take IT by storm. Whereas traditional tech support offers a break-fix, or reactive approach, managed IT is proactive and offers monitoring, maintenance and technical support. Similar to maintaining in-house IT but without the hefty price tag that small businesses struggle to afford, managed IT companies familiarize themselves with … Read More

How Can Hosted Virtual Desktops Benefit My Business?

troysolisCloud Solutions, Security, TechnologyLeave a Comment

Maintaining data and applications on desktop devices, while historically the only way to operate, is becoming obsolete in the corporate world. There many good reasons for this! More and more companies are not only switching to cloud servers but also to hosted virtual desktops…and they are reaping the benefits. What are hosted virtual desktops? Hosted virtual desktops or HVDs are … Read More

Why Your Company’s Data Security Plan Needs Regular Review

troysolisSecurityLeave a Comment

In today’s information age, companies gather mind-boggling amounts of data for the purpose of increasing both profitability and efficiency. While our ability to gather and interpret data continues to increase, we are also increasingly susceptible to security breaches. These breaches can threaten exposure of this confidential information and ultimately our company’s reputation. For these reasons, regular reviews of your company … Read More

Creating a Data Security Plan

troysolisSecurityLeave a Comment

In an age where we have a mind-blowing amount of information shared through mobile and online transactions, the importance of protecting sensitive data is absolutely paramount. In the first seven months of 2017 alone, the Identity Theft Research Center reported over 900 data breaches that consequently exposed nearly 17 million data records. The vast majority of affected businesses? Small businesses … Read More

Data Security Tips for Your Office Administrator

troysolisSecurityLeave a Comment

Security breaches and cyber attacks are no laughing matter. According to statistics from cybintnews.com, 64% of companies experience web-based attacks and 43 percent of these attacks target small businesses. Sadly, Scan, Film or Store Ltd. reports that more than 60% of companies never recover from a significant data loss, the ripple effect from which can absolutely devastate a thriving business … Read More

5 Reasons Small Businesses Should Back Up Their Data

troysolisSecurityLeave a Comment

SOL-I.S. takes the security of your data seriously. Sometimes, a small business owner will ask us why they need to back up their data. They run their business out of their homes and don’t make too much in revenue—why would a hacker be interested in their data? 1. You don’t know when a data disaster will strike. From floods and … Read More

Phishing – In Case You Didn’t Know

troysolisSecurityLeave a Comment

In case you’re not familiar, here is a good example of what a phishing scam looks like.  Many of us receive notifications of unusual sign in activity.  These days, with all of the scare of cyber-attacks and hacking, it is important to understand that as part of the line of defense.  You as a user must know that phishing messages … Read More