10 Dec 2019

Small and Mid-Size Businesses Need to Focus on Cybersecurity

2019-12-18T10:50:13-07:00

What are you doing to protect your business and secure sensitive customer data? Many #SMBs believe that they're not at risk for a cyberattack, which makes them an easier target. Check out this article for strategies to protect valuable customer information. Then give us a call. Our team at GeeksHD can help you get started.

Small and Mid-Size Businesses Need to Focus on Cybersecurity2019-12-18T10:50:13-07:00
10 Dec 2019

Develop ‘Security Champions’ For Successful Enterprise Security Scalability

2019-12-18T10:50:18-07:00

"Scaling up a corporate security department can be an exercise in futility. These organizations need to cover multiple areas of expertise, from classic IT security to physical security, compliance, regulation, secure coding, incident handling and legal/privacy, all while facing the need to run lean." Read this article for to discover how getting to the root cause of vulnerabilities helps leverage your best assets and employees to protect your organization from future breaches.

Develop ‘Security Champions’ For Successful Enterprise Security Scalability2019-12-18T10:50:18-07:00
9 Dec 2019

Is your company secure?

2019-12-09T17:07:01-07:00

It takes 311 days and $4 million on average to contain an email hack. With Microsoft 365, GeeksHD can help your organization avoid costly breaches and stay secure. Microsoft 365 is a complete, intelligent solution to empower employees to be creative and work securely together. It brings together the abilities to identify and access management, threat protection, information protection and security management in a simple, secure, all-in-one solution. Contact us to learn more.

Is your company secure?2019-12-09T17:07:01-07:00
9 Dec 2019

Customer story: iSalon

2019-12-18T10:50:27-07:00

For @iSalon, making the move to #Microsoft365Business was a no-brainer. In fact, the IT department at @iSalon identified the superior data-loss prevention tools from Microsoft 365 as a game-changer for the company. In addition to protecting customer #data and simplifying IT management, @iSalon has already seen a positive impact on its bottom line since adopting Microsoft 365 Business. Our team at GeeksHD can help you increase security measures and grow your business. Contact us to learn more.

Customer story: iSalon2019-12-18T10:50:27-07:00
9 Dec 2019

Should you replace your Mac?

2019-12-09T08:00:33-07:00

If you’ve owned a Mac for quite some time, it’s probable that you’ve gone through a few issues while using it. And after a while, using it can be more of a hassle than a convenience. If you’re already experiencing some major issues, it may be time to replace your Mac. Here are some telltale signs that you should.

Your device can’t support the latest macOS version

Apple releases a new version of macOS every September or October. Typically, Mac models from the past several years are supported. So if your device can’t update to the latest version, it’s a sign that you need to have your Mac replaced.

As of this writing, the latest macOS version is 10.15 Catalina. Here are the following Mac models that support the update:

  • MacBook (2015 and later)
  • MacBook Air (2012 and later)
  • MacBook Pro (2012 and later)
  • iMac (2012 and later)
  • iMac Pro (2017 and later)
  • Mac Pro (2013 and later)
  • Mac mini (2012 and later)

This means that devices made earlier than those in the list cannot install macOS Catalina. For […]

Should you replace your Mac?2019-12-09T08:00:33-07:00
6 Dec 2019

What Wi-Fi router features to look for

2019-12-18T10:50:41-07:00

Wireless routers are essential for operating a modern business. Routers allow one network connection to essentially be split into many and then shared by different users and devices — usually over a Wi-Fi connection. If you are looking for a new Wi-Fi router for your office, there are some important features you should be aware of.

Network type

Look at any router and you will quickly see that there are a number of different networks available. The four most commonly found are 802.1b, 802.1g, 802.1n, and 802.11ac. These designations indicate how fast the router can transfer wireless data, with 802.11ac being the fastest of these four. Those who want to connect multiple devices via Wi-Fi or cable may do better with 802.11ac router.

Throughput

This is closely associated with the router’s network type, and is usually one of the first things listed on router boxes and specifications. To spot the router’s throughput, look for Mbps. This indicates the speed at which the router is supposed to transmit data from your connection […]

What Wi-Fi router features to look for2019-12-18T10:50:41-07:00
4 Dec 2019

Why telephony and VoIP attacks continue

2019-12-18T10:50:52-07:00

Hackers will never stop looking for new ways to hurt your business. One way is through launching denial-of-service (DoS) attacks on Voice over Internet Protocol (VoIP) systems. Read on for a complete rundown of this cyberthreat.

Denial-of-service attacks

The end goal of any DoS attack is to overwhelm a system with so many requests that the system is eventually forced to shut down. Telephony DoS (TDoS) attack is a subcategory leveled at VoIP systems. Alarmingly, this attack is commonly used against hospitals and 911 phone lines. Much like ransomware, some TDoS attackers even demand a ransom to halt the attack. They take advantage of cryptocurrencies and caller-ID spoofing to make it incredibly difficult to identify attackers.

TDoS attacks generally employ fewer resources than the DoS attacks that are designed to cripple IT systems such as networks, servers, and software. At its most basic, all that a TDoS attack requires is an automated phone dialer that calls a target phone number and hangs up — over and over. That very simple […]

Why telephony and VoIP attacks continue2019-12-18T10:50:52-07:00
2 Dec 2019

Customer story: Jack’s Diving Locker

2019-12-04T07:23:30-07:00

Did you know that technology is helping to protect and save our oceans? With #cloud security and communication tools, @JacksDiveLocker has exponentially increased their outreach and education efforts to keep our oceans healthy and thriving. Want to see how the latest #security tools can help grow your business? Contact our team at GeeksHD to get started today!

Customer story: Jack’s Diving Locker2019-12-04T07:23:30-07:00
2 Dec 2019

Predictive forecasting in Office 365’s Power BI

2019-12-04T07:23:25-07:00

People have always been intrigued by what the future holds. Seers use crystal balls and tarot cards, but business managers such as yourself need a tool that’s based purely on science. If you’re an Office 365 subscriber, you now have Power BI’s predictive forecasting at your disposal.

Predictive forecasting uses a variety of statistical techniques, such as modeling and data mining, to analyze current and historical facts to make predictions about the future.
The predictive forecasting function of Office 365 provides users with the skills to generate reports, interactive charts, and 3D visualizations of business performance.

Its built-in predictive forecasting models can automatically detect seasonality in the data, though users can override this by applying a non-seasonal algorithm if they so desire. It also enables users to see how results are affected by adjusting the parameters of the time or confidence interval assigned to be analyzed. Simply put, users can perform advanced forecasting without the complexity that usually accompanies these kinds of processes.

Power BI’s predictive forecasting can also help fill […]

Predictive forecasting in Office 365’s Power BI2019-12-04T07:23:25-07:00
29 Nov 2019

Simple steps to protect data in the cloud

2019-12-04T07:23:19-07:00

No business wants a data breach. According to IBM’s 2019 Cost of a Data Breach Report, a single data breach can cost organizations $3.92 million on average. If you plan to migrate your organization’s data to the cloud or if it’s already there, you may think that your data is now safe from data breaches. That couldn’t be further than the truth. Take a proactive stance in mitigating data breaches by following these simple steps.

The cloud opens up some great benefits for businesses and is here to stay. However, as with all technology advancements, you need to also be aware of its vulnerabilities and security issues. If you want to proactively prevent data security breaches in the cloud, then here are five tips to follow:

Know your cloud apps:

Get a comprehensive view of the business readiness of apps. Ask questions like: Which ones render you more or less prone to a breach? Does an app encrypt data stored on the service? Does it separate your data from […]

Simple steps to protect data in the cloud2019-12-04T07:23:19-07:00
Go to Top