BLOG
TekTalk: Cyber Security
CEO and Founder Robert Hood reviews the three segments to optimal security implementation: Defense, Monitoring, and Response. No matter the size, industry, or budget, Robert shares essential insight on how to protect your business.
Is there a Cyber Ninja after you?
It is important to consider two key points when discussing security for your information systems: security is a process, not a destination, and you can never be 100% secure. Security is a continual process of review, plan, implement, monitor, and repeat.
TekTalk: The Principles of IT Budgeting
It’s never too early to organize your IT budget for the next calendar year. Making smart decisions early can save your business a sufficient amount of time and money. Spotlink CEO and Founder Robert Hood reviews his simple 6-step budgeting process.
Two Factors of Proper Data Management
IT service providers have two key roles when it comes to ongoing operations, Data Protection and Data Security. While they sound like one in the same, these two responsibilites are very different.
TekTalk: Surviving Technology Disasters
SpotLink CEO and founder Robert Hood will review strategies and techniques to help you and your business technology not only survive disasters, but continue to operate and service your clients when you are still trying to recover.
IT Alert: WannaCry Ransomware
Last Friday a new version of Ransomware, dubbed WannaCry, was release worldwide, affecting computers in as many as 99 countries. This morning a new variant was also released. Companies such as FedEx, the British National Health Service, and LATAM airlines have been infected.
Our Emails are Certified Safe.
No one is immune from receiving phishing emails, even we receive dozens per week. Often, they seem to come from a known email address (they’re not – the From: address is forged). With spear phishing, the email message is specifically written for you so that it seems familiar enough to trick you into trusting the content.