Ready, Set, Migrate: Transitioning to Microsoft Office 365 with Modern Managed IT
Microsoft Office 365 and Google G Suite are cloud productivity suites that Modern Managed IT can now help you migrate to and even help support and manage for you. If this is something that you have been considering, but are afraid of it being a daunting task, were are here to help. Give us a […]
How do I Protect My Data on Google Drive?
Imagine that your internal bookkeeper manages invoices via Google Sheets since they’re free and easy to share. After a year, he or she decides to leave the company and you remove their G Suite account. You sign in the next month and notice that all of your invoices from last year are gone! Unfortunately, Google […]
How to Prevent Malicious Bots and Worms from Network Scanning
Network scanning is the use of computers or other devices to gather information in order to compromise your network. Your business’ network is likely being scanned by internet worms and bots over 100 times a day. These bots and worms scan your network to help hackers find vulnerabilities and gain access to some of your […]
What are DDoS Attacks and How to Defend Your Network
You may have heard the term “DDoS” repeated in the news recently and wondered what exactly that meant. The term “DDoS” means a “Distributed Denial of Service” attack. What this means in non-technical terms is that someone is taking a large amount of compromised or vulnerable devices and directing them to send traffic to your network to […]
Remote Access VPN: How To Protect Your Data With a Remote VPN
Do you know who’s watching or tracking your every move when you’re on public Wi-Fi? More than likely, there are bad actors (hackers) out there without you knowing. Think about how many times you connect to a public Wi-Fi at the library, school or even a coffee shop without protecting your computer and data. Be […]
Firewall Protection: Why Your Old Firewall Isn’t Enough
Firewalls from five years ago are no longer enough to protect your networks. Traditional firewalls block connections into (ingress) and out (egress) of your network based on the rules that you apply to it. In a traditional sense, you would apply a rule to the access control list (ACL) and it would allow or block […]
Protecting Your Router from Hackers: Need a Reboot?
One of the most important devices in your home or business may be one that you never see or think about. In most cases, it’s the first line of defense in your network security. If it’s vulnerable, your whole network is at risk of being compromised. I’m referring to your routers and nation-state hackers are […]
Firewalls for Small Businesses: What you Need to Know
Most small businesses are aware that viruses and malware threaten their business, but the response is limited to installing antivirus software. While this software recognizes and quarantines infections, it doesn’t prevent viruses and malware from reaching employee devices. A firewall is a much better first line of defense that proactively blocks attacks. In this article, we will […]
Guide to Securing Your Business’s Network from Attacks
Imagine that a someone walks into your small business office, sits down at an unlocked computer and starts downloading files onto a USB thumb drive. You would probably immediately unplug the thumb drive and call the police! The reality is that criminals are showing up at thousands of small businesses every day to do the […]
4 Signs That Your Network May Have Been Hacked
More than half of all small to mid-sized businesses have been hacked at some point, according to Hartford Steam Boiler, and three-quarters weren’t able to restore all of the lost data. The average company takes more than 200 days to detect a data breach, according to Ponemon Institute, which adds millions of dollars to the average […]