Tag

security

Latest articles

By now if you’re running a business – big or small – you’re well aware of ransomware. You’ve heard of the airports, transportation systems, utilities and hotels that have been attacked. Here’s how to avoid becoming another headline-making ransomware victim.

What’s even scarier than someone hacking just “because”? When that someone is a someone you trust—and possibly even hired—at work. In this post, we’ll be easin’ into spooky season with a wrap-up of advice about protecting your firm from external and internal threats.

Like most small business owners, Susan (not her real name) juggled a lot … and sometimes things would get missed. We can all relate to that. But in this case, the “missed thing” almost cost Susan everything. Read her cautionary tale.

The best cloud providers also have the best technology and security policies. Discover what they use and how you can start using them at your business, too.

How much should you know about cybersecurity? That answer depends on if you are using a provider to host your business’s applications, software, files and data in the cloud. Get an overview of how our cloud technology safeguards your data—so you can focus on work.

Now is the time to review and tune-up your security processes. The COVID-created rush to have everyone working from home inadvertently exposed firms to security threats they may not have considered before the pandemic struck. Even firms that were already in the cloud (and had adopted a mobile mindset) had to quickly transition tax and administrative personnel that may not have previously had experience working remotely.

The COVID-19 pandemic required accounting firms to go 100% remote virtually overnight.   While a good number of firms were either already in the cloud had implemented cloud-enabled applications, or had…

It’s overwhelming. Social distancing, guarding against the deadly coronavirus, stocking up on enough food for a potential lockdown … all the while trying to keep a small business afloat during…

This post was written by Natalie K. Bowen, client success manager at Right Networks  Recently, a user at a firm was the unfortunate victim of yet another phishing attack. In…

This post was written by Brian Rae, director of IT/security at Right Networks  As if the trial of being shut in at home and worrying about friends and family weren’t…

On this episode of The Right Byte, Roman Kepczyk discusses why it is necessary to expand your monitor screen real estate. Roman explains the need for a large monitor to…

On this episode of The Right Byte, Roman Kepczyk explains that protecting taxpayer data is the law. Roman discusses five checkpoints that can keep your business compliant with the law…