security

Cyber Insurance: Is it worth it?

It’s no secret that data breaches cost businesses a lot of money, an average of $3.86 million to be more exact. So what if there was a way to help recoup or cover some of the post breach expenses?[…]

5 Key Ways to Minimize Downtime Risk

Recently we talked about how to find the cost of downtime to your business, which is an important piece to developing your disaster recovery plan, for both proactive and reactive planning.

But now[…]

Never Underestimate the Importance of a Disaster Recovery Plan

Can your small business survive a disaster, natural or otherwise? If you can’t answer that with a resounding “Yes!” and have a well documented plan to back it up, we’ve got some work to do. Having a[…]

Google's New Password Checkup Extension

After every major password breach comes new security features, and now, after the release of Collection #1...and #2, #3, #4, and #5, comes Google’s newest innovation to help secure your passwords and[…]

6 Ways to Improve your Data Security

“IT Security threats come in all different shapes and sizes, and just as quickly as we put up barriers, cybercriminals find new ways to break through.” - Gary Watson, CTO of StorCentric and Founder[…]

FTC Small Business Cybersecurity Resources

In October of this year, as part of the National Cybersecurity Awareness Month developed by the National Cybersecurity Alliance, the Federal Trade Commission (FTC) launched a bank of resources for[…]

4 of the Most Common Phishing Scams and How to Spot Them

We talk a lot about how to keep yourself safe online, but sometimes we don’t focus enough on what you are supposed to be keeping yourself safe from. Last week I received an email about a specific[…]

The Discovery and Disclosure of a Polycom Security Vulnerability

One night last June (2017), I was working from home, writing some software that would add Microsoft multi-factor-authentication to a VPN service that IT Freedom offers. The software itself was[…]

When will your Technology Reach "End of Life"?

"End of Life" signifies the last day that a certain product or piece of technology will receive security updates. We talk a lot about how important it is to stay on top of updates, and it's just as[…]

We’ll answer your tough technology questions.

Connect your team of trusted IT Support Professionals in Austin.
Contact Us