ARTICLES & TECH NEWS

Articles designed to keep you informed of the latest tech trends, industry specific articles and news!

shutterstock 548161990 Large

6 easy IT policies all companies should implement right away

6 easy IT policies all companies should implement right away! Many small businesses make the mistake of skipping over policies. They believe that formalities are not necessary. They will simply inform staff what is expected when it comes up, believing this to be sufficient. However, this attitude…

Read More


0 Comments10 Minutes

6 outdated technologies not to use

6 Technologies You Shouldn’t Use Anymore. Checkout #5!!

6 Technologies You Shouldn't Use Anymore. The pace at which technology develops is unquestionably rapid. Tools that were once must-haves, such as Internet Explorer and Adobe Flash, become antiquated. New tools take the place of old ones. Vulnerabilities in outdated technology can leave computers…

Read More


0 Comments9 Minutes

ex employee wifi access 1

Employee Left- How to secure Wi-Fi from previous employee

Employee Left- How to secure Wi-Fi from previous employee Did you know that if someone has the password, they have complete access to your network? In general, I see that these passwords seldom change. Employees come and go, but the Wi-Fi password at most businesses is solid and unchanging for many…

Read More


0 Comments6 Minutes

modern desk power toys

This free Microsoft tool massively increased my productivity

This free Microsoft tool massively increased my productivity If you are like me, you probably ditched your 2 monitor setup for an ultra wide, or perhaps 2 ultrawide. If you did jump on this trend then you quickly realized that you have a lot more real-estate to manage and organize when working with…

Read More


0 Comments7 Minutes

pc load letter bring like to old printer

Get any old unsupported printer to work with Windows 11

Get any old unsupported printer to work with Windows 11 We have all been there, when you have to get rid of your good printer because it's no longer supported by the new version of Windows. Now, this is frustrating if it’s a home printer that can be replaced for a few hundred bucks, but what if…

Read More


0 Comments8 Minutes

how to get free managed it services

How to get your Managed IT Services for free

How to get your Managed IT Services for free There's no doubt that running a business is expensive. From the cost of goods and services, to the price of office space and employee salaries, there are a lot of expenses associated with keeping a company up and running. Bills, such as cable, internet,…

Read More


0 Comments7 Minutes

this guy doesnt need msp

Who needs managed IT services(MSP)? Not this guy…

Who needs managed services? Not this guy... "Why do I need to pay for an MSP? It's not like my computer breaks often..." Typically, what I hear from clients, is that they that look at an MSP as just another utility bill, like your phone or internet. It's really much more than just another overhead…

Read More


0 Comments9 Minutes

setup business network the correct way

How to quickly setup your office network the correct way

How to quickly setup your office network the correct way So, you are setting up your office network, where do you begin? Depending on the size of your office, you will need different hardware and…

Read More


0 Comments9 Minutes

internet of things securing devices

How to quickly secure your network from rogue IoT devices

The easy way to secure you IoT devices and systems Internet of Things (IoT) devices are constantly growing in popularity and use, from smart thermostats to connected security cameras. While these devices…

Read More


0 Comments7 Minutes

employee duty separation cybersecurity

Separate duties for employees or end up like this…

Separate duties for employees or end up like this... With war in Ukraine raging on, the cyber warfare between the Russians and the West continues to see an increase in Russian cybercrime. We deal with a lot of clients that employ external developers for specific projects. What we frequently…

Read More


0 Comments7 Minutes

10 ways to prevent russian cyberattack

10 Ways you can fight against Russia’s cyberattacks

10 Ways you can fight against Russia's cyberattacks I had the pleasure of attending the Tech Execs Summit in Forsyth. They brought several speakers that had a lot of insight into how and why Russia's cyberwar is impacting local businesses. We are no longer threatened by the one man show that just…

Read More


0 Comments12 Minutes

selecting best it services company alpharetta ga

5 things: When selecting best IT Services Co. in Alpharetta

5 things: When selecting best IT Services Co. in Alpharetta This post will discuss the factors to consider while selecting an MSP for your business. Choosing an MSP is a big step in deciding to outsource or enhance your IT needs, and there are many things to think about when it comes to how it fits…

Read More


0 Comments10 Minutes

data breach extortion methods and ways to stop it

Data breach the new extortion method: backups are not enough

Data breach the new extortion method: backups are not enough You hear about data breaches all the time, however; what is it, and why does it keep happening? In this article, we will explain data breaches and why you should be concerned about them. When a data breach occurs, it means that someone…

Read More


0 Comments7 Minutes

russian hackers war in ukraine

What to do NOW as war in Ukraine increases cybercrime

What to do NOW as war in Ukraine increases cybercrime As the war in Ukraine keeps escalating, many more cyber-crime groups are starting to emerge as a result. Why do you think this is happening? In places around the world that don’t have many opportunities to make money legitimately turn to crime…

Read More


0 Comments8 Minutes

2022 top3 security trends

Top 3 cybersecurity trends to prepare for in 2022

With the COVID pandemic mostly behind us, we are faced with the reality that the workplace has forever been changed. Security is on the top minds of most business owners and CIO’s out there. Here are the new trends that we will see more of in the coming year. Location Independent Security is no…

Read More


0 Comments4 Minutes

network map diagram network support

What makes a good network map, and why you should care

What makes a good network map, and why you should care Do you have a network map? Chances are that if you work in networking, you do. Or did you know what a network map was before reading this article? The term is used very often and hardly anyone knows what it means. This article is intended to…

Read More


0 Comments5 Minutes

data loss due to corporate failure atlanta data prevention

What John did to lose his data storing it in the wrong place

What John did to lose his data storing it in the wrong place I’ve worked with many clients in different industries; however, what I noticed is always common in majority of the businesses that we take on as clients is the lack of uniformity and processes.  This includes how data is stored, handled,…

Read More


0 Comments8 Minutes

cyber security training atlanta

Before & after the cybersecurity training

Before & after the cybersecurity training Let's pose a scenario: Your top client receives an email from you that sounds awfully suspicious, it may go like, "Hey, I sent you the document you requested. Click this link to download the PDF." If your clients are smart, they would quickly reply to…

Read More


0 Comments7 Minutes

safeguard network attached storage NAS cybersecurity QNAP deadbolt

3 steps to safeguard your Network Attached Storage (NAS)

Network Attached Storage (NAS) devices can be great resources on your network when it comes to centralized storage accessible to all devices on the network. The issue is that this centralized entity may be accessed from outside the network. This past week, QNAP NAS devices have been targeted by a…

Read More


0 Comments3 Minutes

apple cyber security mac business

Security settings to change right away on your Macs

Security settings to change right away on your Macs Apple users are still just at risk of phishing attacks as any other user on any device. Although Macs come with XProtest and Gatekeeper designed to keep users safe, socially engineered attacks still don't prevent end users from handing over their…

Read More


0 Comments5 Minutes

Disaster recovery plan planning

Quick Disaster Recovery plan to implement now for 2022

Quick Disaster Recovery plan to implement now for 2022 You have heard the words Business Continuity and Disaster Recovery being thrown around; however, I know a fiery earthquake or the great flood might not be the top of your concern. Sadly, a disaster in today's world comes in the form of…

Read More


0 Comments8 Minutes

microsoft defender cracked vulnerability

How hackers are getting around Microsoft Defender

How hackers are getting around Microsoft Defender Microsoft presents Windows Defender as a one-solution fits all, however as we learned that is certainly not the case in the cybersecurity world. Cybersecurity should be tailored towards a particular business, there is rarely one size fits all…

Read More


0 Comments4 Minutes

cyber security solution atlanta georgia

How to sell Cybersecurity by partnering instead of selling

How to sell Cybersecurity by partnering instead of selling Here is the deal, the threat actors don't care for the size of the business you have. An example can be, a small software development company that does work for larger firms. Having their clients’ data leaked can be detrimental to them.…

Read More


0 Comments7 Minutes

man in the middle MitM phishing Attack diagram

Are you sending your credentials to a MitM without knowing it?

Are you sending your credentials to MitM without knowing it? About a month ago, we reported that some phishing kits had added the capability of intercepting SMS-based 2FA tokens. Since then, we decided to look for more such tools and found a whopping 1200+ web-based phishing kits in our research,…

Read More


0 Comments5 Minutes

security settings for 2022 cybersecurity news

Security settings you need to change right away for 2022

Security settings you need to change right away for 2022 Often times we think of security solutions as just an antivirus and you are done. At least that's what most business owners assume it takes to secure their systems. But outside of only installing and running an antivirus solution there are…

Read More


0 Comments13 Minutes

Log4J

Why you should care about the Log4J vulnerability

Why you should care about the Log4J vulnerability Apache is an HTTP server that is open-source, cross platform and represents about 33% of all websites on the internet and countless applications that utilize parts of it. Log4J is a Java logging library used by the Apache server and many of those…

Read More


0 Comments4 Minutes

how to get pci compliant

How to quickly pass a PCI compliance scan

How to quickly pass a PCI compliance scan The Payment Card Industry Data Security Standard (PCI DSS) is a set of regulations that businesses need to follow in order to protect sensitive credit card and personal information. It can be hard for small business owners who don't know how the PCI DSS…

Read More


0 Comments10 Minutes

diagnosing internet connection scaled

Tricks to diagnose and restore your internet connection

Tricks to diagnose internet connection from your seat I ask this question on interviews when checking to see if a technician knows basic networking, and you would be surprised how many do not! I will help you out without getting technical, explaining how packets are sent, and how IP addresses work.…

Read More


0 Comments6 Minutes

fake flash player update download now

James received a message, “what’s this link you sent me??”

James received a message, "What's this link you sent me??" James received a reply back from his co-worker telling him that he sent them a drobox link that looked suspicious. The next day another person complained to James telling him he sent them a google doc that is asking to login and they just…

Read More


0 Comments5 Minutes

You in dential ransomware 1

These 2 simple things could save your business from a cyberattack

These 2 simple things could save your business from a cyberattack It's interesting when I hear from CEO's and business owners the usual "We are not big enough to get hacked," or "Why would anyone want to target us?" What I always tell our clients is that the threat actors don't care what you do,…

Read More


0 Comments8 Minutes

msp tips enterprise backup cheap

MSP tips for SMB – Enterprise backup on budget for your organization

MSP tips for SMB - Enterprise backup on budget for your organization Some may think when selecting a Managed Services Provider MSP, that we have access to some magic secrete sauce programs, or develop things in house to help secure or backup or manage your systems. We use the same software…

Read More


0 Comments7 Minutes

how migrate to office 365

How do you migrate to Office 365? Smoothly…

How do you migrate to Office 365? Smoothly... If you are on a different hosted platform of exchange, it takes careful planning, staging, and execution and communication with end users. Understanding the environment and gathering as much information as possible is the first critical step. This…

Read More


0 Comments6 Minutes

switch to office 365 email atlanta

Still not on Office 365? Here is a good reason to switch…

Still not on Office 365? Here is a good reason to switch... Reasons why you should migrate to Office 365 if you are still on another platform. By now I don’t have to explain the benefits of exchange email and why its much better than SMTP and POP3. What is Exchange or Office 365 email? Let's just…

Read More


0 Comments4 Minutes

8 things to do in case of a breach cybersecurity

8 things to do in case your systems have been breached

8 things to do in case your systems have been breached Finding out that your company has been the latest unwitting victim of a ransomware attack capable of restricting computer systems and encrypting data if a ransom is not paid to cybercriminals would be a nightmare for many corporations. There…

Read More


0 Comments10 Minutes

how to check your login leaked on dark web

Quickly check the Dark Web for your leaked credentials… without checking the Dark Web

Quickly check the Dark Web for your leaked credentials… without checking the Dark Web     Ever wonder if your most used username and password is floating out there in the dark web, but don't want to install a Tor browser, start visiting questionable underground websites, downloading data…

Read More


0 Comments6 Minutes

2 factor stealing bot Moment

So you think 2FA is protecting you… That’s cute

So you think 2FA is protecting you... That's cute The phone rings, a voice on the other end states, "Welcome to Chase Fraud protection department, we have recently receive a charge from E Constants online retailer for $74.32. If this was not you, please press 1." A few seconds later the phone…

Read More


0 Comments8 Minutes

shutterstock 231846742 scaled

What your “IT Guy” won’t tell you. MIGHT hurt you…

What your “IT Guy” won’t tell you. MIGHT hurt you… I'm sure there's more than one IT person who's reading this wondering what they've done to be scrutinized. But here it goes.... Things that are common with "IT Guys" I will first list out some of the concerns that you should think about, and then…

Read More


0 Comments10 Minutes

you should use azure its free office365

If you have Office 365, you should utilize Azure AD to protect your firm for free!

If you have Office 365, you should utilize Azure AD to protect your firm   Office 365 is Microsoft's cloud productivity suite, with comparable features to Google's G Suite. It includes online versions from many of the most-used Office applications, including Word, Excel, and PowerPoint. A…

Read More


0 Comments5 Minutes

biggest cybersecurity threat 2022 2021 for all businesses

The biggest cybersecurity threat in 2021 and 2022 affecting all businesses

What is the biggest cybersecurity threat to businesses in 2021 and 2022 that affects all businesses The types of cyber attacks that pose the most serious threat vary depending on the business. There are many different kinds of attacks that hackers might launch, including phishing attempts,…

Read More


0 Comments6 Minutes

managed services cost in atlanta

What is the cost for managed IT services in Atlanta?

What is the cost for managed IT services in Atlanta? The answer to this question varies depending on the companies and services they offer. Most MSPs will sound the same when it comes to the service and their promises however; every market is different, that is to say that the MSP cost in NewYork…

Read More


0 Comments5 Minutes

What 5 minutes of interruption can do to your workflow Moment

What 5 minutes of interruption can do to your workflow

What 5 Minutes of Interruption Can Do To Your Workflow I think it’s safe to say that everyone agrees, time is money. Interruption in our tasks can add up very quickly. For example, a study done at The University of California by Gloria Mark, says that it takes about 25 minutes to return to the…

Read More


0 Comments6 Minutes

when should companies hire msp

How Invisible IT Costs Add up fast & How to Calculate Them

How invisible IT costs add up quickly and how to calculate them When you hear Managed Service Providers (MSP) companies talk about saving you money, making things more efficient etc., etc., (insert more IT jargon here). What does this all mean? Hiring an IT support provider costs companies money…

Read More


0 Comments6 Minutes

human resources are targets cyberattacks

How Lisa had her paycheck stolen – Phishing Attack

How Lisa had her paycheck stolen - Phishing Attack Here is how Lisa had her paycheck stolen. Lets walk through the events leading up to it and how it actually happened! BECKY FROM HR Received an email from an employee named Lisa requesting to change her paycheck to be deposited into a different…

Read More


0 Comments2 Minutes

yubico biometric key

Retrofit your computer with biometric for $80

In the spirit of October Security month. We have used biometrics to unlock our phones, pay at the grocery stores, log in to our bank accounts for many years now. It only makes sense that this level of security makes it into mainstream day-to-day use on our desktops and laptops. Although many…

Read More


0 Comments2 Minutes

cpa cybersecurity MSP network atlanta

What it was like for a CPA firm to survive a cyberattack

What it was like for a CPA firm to survive a cyberattack I met Joe at a networking event, he is a CPA and owns his own Public Accounting Firm. Over time we became friends and I assisted his MSP (Managed Services Provider) on several IT projects. He employs 12-15 accountants depending on the time…

Read More


0 Comments15 Minutes

how to upgrade to windows 11

Skip the line! Install Windows 11 and don’t wait for automatic update!

Outside of a controversial Start Menu, windows 11 appears to be mostly familiar to everyone. You can checkout the new features from Microsoft. However if you don't want to wait until the new update arrives to your computer as an automatic update.  Don't worry, just head over to Microsoft and…

Read More


0 Comments1 Minutes

20210928 150152

Network closet cleanup. How to save money & organize data closet

Network closet cleanup. How to save money & organize data closet If your data closets look like a rats nest with unorganized unlabeled wires everywhere, congrats, you are in with the majority! Most of our clients that we come across have a similar…

Read More


0 Comments9 Minutes

windows11 update

Microsoft Explains why Windows 11 will be soo much faster!

This 12 min video explains all the features of upcoming Windows 11 and what will make it soo much faster than windows 10.  Its pretty impressive that microsoft listened to the feedback of the beta tester program and made the suggested improvements. The real interesting feature is how you will no…

Read More


0 Comments1 Minutes

malware protection take these 2 steps

Stop ransomware with these TWO steps

Stop ransomware with these TWO steps In a world where you can sign up as Ransomware As A Service its no surprise that its soo profitable and soo lucrative that everyone must take the steps to ensure they are protected, because everyone is a target. Windows 10 and 11 comes with many security…

Read More


0 Comments2 Minutes

vpn credentials leaked cybersecurity atlanta

500,000 Fortinet VPN Credentials Just Got Leaked

500,000 Fortinet VPN Credentials Got Leaked on Hackers Forum The list of Fortinet VPN credentials was released by a malicious actor known as "Orange," who is the administrator of the recently launched RAMP hacking forum and a past leader of the Babuk Ransomware initiative. Almost 500,000 Fortinet…

Read More


0 Comments2 Minutes

best managed service provider msp in metro atlanta

Read this before you hire an IT support company…

CLICK PLAY TO LISTEN TO THIS ARTICLE [audio src="https://www.alphacis.com/wp-content/uploads/2021/08/Murf-7.mp3" /] When your business needs to move beyond what you can DIY on your own, it might be time to start thinking about outsourcing your IT. Every company has a different set of needs and various levels of…

Read More


0 Comments15 Minutes

NAS network attached storage ransomware active directory

Remove NAS from Active Directory (AD) Right Away!

If you are able to connect to your Network Attached Storage Device with your Active Directory credentials it might be a good idea to change the way your NAS authenticates. Ransomware attacks on the rise its hard to think of a work environment where inside the network should be thought of as…

Read More


0 Comments4 Minutes

how to lower cyber insurance premiums

Do This Now to Reduce Cyber Insurance Policy Costs

  When it comes to insurance reducing exposures is what underwriters generally focus on to determine the premium costs: Are you storing sensitive data? Are you running credit cards through your terminals? Is your staff trained in security? Do you run backup software and do you test these…

Read More


0 Comments5 Minutes

next generation firewall layer7 firewall ngfw

Why Your Business Will Need Next Generation Firewall (NGFW)

What is a next-generation firewall (NGFW)? A next-generation firewall (NGFW) is a network security appliance capable of inspecting traffic at the protocol level. An NGFW can enable companies to block unauthorized access, prevent malware from entering the network and securely accelerate business…

Read More


0 Comments5 Minutes

cpa domains register accountants

ALL CPA firms should register .CPA Domain while it’s still available!

AICPA launched a new CPA-specific top level domain (TLD) that will help you build trust and reach your clients in a more secure way. This verification process ensures that only those who meet certain requirements can register for this TLD, which adds another safeguard and level of trust for…

Read More


0 Comments1 Minutes

accounting cpa cyber security network security atlanta experts

Cybercriminals Are Now Targeting CPA and Accounting Firms 🔐

Cybercriminals Are Now Targeting CPA and Accounting Firms Reasons for targeting accounting firms is almost obvious. Consider if you are trying to get sensitive information such as bank accounts, access to retirement and investment accounts, social security and EIN numbers. What industry would you…

Read More


0 Comments10 Minutes

5ways dealerships can save on i t

5 Ways Dealerships Can Save Money On I.T. Costs

1.      Stick with one vendor for managing I.T. Think of services with a major cable company or Internet provider. It’s always cheaper when you bundle multiple services, like internet and T.V., and/or phone. This concept is also true when it comes to selecting an I.T. services vendor. Much like a…

Read More


0 Comments6 Minutes

3things to prevent ransomware

Do these 3 things right now to prevent ransomware on your systems!

Do these 3 things right now to prevent ransomware on your systems! Quick and simple, ransomware works by encrypting your hard drive and any device connected to your computers.  This makes all of your files inaccessible and you will see text documents in every folder with instructions on how to pay…

Read More


0 Comments6 Minutes

why you should fire your it guy if they do these things

Fire your IT guy if they do any of these things…

Why you should fire your IT guy Over time things change, people change, and your organization's needs change as well. Here are some of the things to look out for with your current IT guy.   Complacency Number one reason to fire your IT guy is complacency.  Just like politicians holding the…

Read More


0 Comments7 Minutes