Catharsis Managed IT’s Blog

Tips, news, and insights from the IT industry

Security

COVID-19 is Having a Big Effect on Cybersecurity

The COVID-19 pandemic has put a lot of stress on people.  Nowhere is this more true than in the small business arena. Small businesses, many of which were forced to suspend or severely alter their operations, are also dealing with cyberattacks. Let’s take a look at the effects COVID-19 has on small businesses regarding cybersecurity. 

Read More »
Tip of the Week

Tip of the Week: Monitoring Hardware to Keep Business Moving

As stay-at-home orders lapse, more and more businesses aim to reopen. For a fair share of these businesses, remote technology has been a godsend. For the businesses that cannot reopen yet, being able to monitor your IT infrastructure while you are out of the office is extremely important to the sustainability of your remote access

Read More »
Security

4 Key Steps to Better Cybersecurity

In many ways, explaining why sufficient cybersecurity is important for your business has become redundant – especially when it is much more important to understand how this cybersecurity needs to protect you. The threats to data and privacy are known, but no less potent. In order to counter them, you need to make sure you

Read More »
Best Practices

Tip of the Week: Ward Off Holiday Scammers

It’s the most wonderful time of the year… for scammers, that is. These kinds of criminals love to take advantage of the gift-giving season. With the right tools for the job, hackers can have a field day stealing sensitive information, like credit card numbers, due to the sheer amount of stuff being purchased by consumers.

Read More »
Security

Even If You Don’t Hear About Small Business Breaches, They Happen

If you have a bank account or a credit card, chances are you’ve been made aware of a hack or a data breach. Big organizations are more frequently being breached, forcing them to run damage control for the often millions of customers affected. News coverage often bashes these big organizations, but what about smaller ones?

Read More »
Security

Ransomware Revisited

Ransom: a sum of money is demanded in order for the release of goods.Software: the programs and other operating information used by a computer. What do you get when you combine the two? Ransomware.  Ransomware is a form of a cyberattack in which a cybercriminal encrypts some of the files your business has stored on

Read More »
Security

Tip of the Week: Network Security Basics

The modern threat landscape is filled with horror stories of people that have been the victim of software vulnerabilities, hackers, and situations that could have been managed differently. Today, we will go over some of the best ways to keep your business from being a victim of a data breach, data theft, or malware attack.

Read More »
Security

Diagnosing a Man-In-the-Middle Attack

The man in the middle has a lot of power and influence over the end result, and this is true even in the technological world. In fact, there are attacks dedicated to this vector, twisting and turning something that your organization needs into what amounts to a threat. We’ll discuss what a Man-in-the-Middle (MitM) attack

Read More »
Security

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats. The truth is that there is

Read More »
Security

Tip of the Week: Improvement Needed to Avoid Cybercrime

Did you know that almost 90 percent of small business owners feel they are completely safe from attack? It’s unfortunate, but the truth of the matter is that half of these businesses will eventually be proven wrong–they too can suffer from a cyberattack. Are you going to risk becoming one of them? You should know

Read More »
Archives
Scroll to Top
Get a FREE IT Consultation
  • This field is for validation purposes and should be left unchanged.