Showing 10 of 18 Results

Cybersecurity Resources

Cybersecurity Resources Cybersecurity is critical and should be part of every budget and insurance policy. Period. Easy targets with valuable data to resell used to be a hacker’s dream. Now, these targets have implemented protection, […]

Berks County Electronics Recycling

Berks County Electronics Recycling Looking for a place to recycle e-waste, electronics, and batteries? 1316 Hilltop Road, Leesport PA accepts the following items free of charge for residents: Computers, Monitors, Laptops, Keyboards, Modems, Printers, Scanners, […]

Domain Registry Letter – JUNK!

If you received a letter that warns your domain name is going to expire, and wants you to register your domain with them – trash it! Unfortunately, if you did not purchase domain privacy protection […]

Unstoppable Mobile Malware

Excerpt from Sophos 2022 Threat Report Windows computers are not the only targets for cybercriminals. Malware also targets the Android and,to a lesser extent, the iOS platform for mobile devices. As our portable and handheld […]

Cybersecurity Checklist

Did you know? 1 in 5 small businesses will suffer a breach this year 81% of breaches happen to small and medium sized businesses 97% of breaches were preventable Perform a Security Assessment The first […]

May 6th – World P@33W0r#d Day

In honor of World Password Day, I’m going to share the shocking statistics about risky password practices (or more like lack of practice), and steps to keep you safe. 91% of people know that using […]

The Need For Managed Threat Response (MTR)

The most devastating cyberthreats generally involve human-led attacks, often exploiting legitimate tools and processes such as PowerShell. However, attackers are evolving, resulting in an increase of successful breaches and attacks. Take a look to see […]

Sophos Endpoint Detection & Response (EDR)

Today’s EDR are used with endpoint security for increased detection, investigation, and response capabilities. However, many EDR solutions lack value to businesses because they are difficult to use, lack sufficient protection, and are resource intensive. […]

Sophos Intercept XG Firewall

See why the XG Firewall stands out from the competition. In a recent survey of 3,000 IT decision makers, the top three complaints with their current firewall were: Visibility Unable to easily answer basic questions […]