top of page
All Posts


Why You Need to Question Facebook Quizzes
When you see a quiz on social media you: A. Always fill it in! Of course, you want to know your celebrity alter ego or what your favorite...


Neglected Software Vulnerabilities and Their Costs
Cyber insurance is essential for the internet-connected business. Yet, when was the last time you reviewed your policy? You may find new...


Smart Ways to Secure Your Laptop
Are you reading this on a laptop? Take a moment to imagine how you’d feel if your laptop were stolen. Maybe you looked away for a moment...


How to Lower Cybersecurity Risks in Healthcare
Healthcare is a prime target for cybercriminals. Protected health information and electronic medical records are a data treasure trove....


The Computer Guy, LLC Ranked Among Elite Managed Service
The Computer Guy, LLC Ranked Among Elite Managed Service Providers on Channel Futures 2023 NextGen 101 List The NextGen 101 List Honors...


How to Combat Cybersecurity Fatigue
When was the last time you had to change your password or received an alert to update your device for what felt like the umpteenth time?...


Is ChatGPT Safe for Businesses to Use?
We may not have hovercraft yet, but ChatGPT offers futuristic innovation to businesses. ChatGPT is an artificial intelligence language...


Are Your Backups Safe?
Backups are the go-to to keep you safe in the event of ransomware or data threats. But the bad guys expect your business to backup. The...


Tackle These Four False Assumptions About Cyber Attackers
There’s one big assumption about cyberattackers that we regularly refute: “It can’t happen to me.” At this point, most businesses do...


Leave that USB Drive Where You Found It
You come across a thumb drive, or USB drive that you don’t recognize. Maybe you find it in the car park of your building or by the copier...


IT Services Agreement or Block Hours Support: Which Is Best for a Small Business?
There are many types of IT support available for a business, and the two most common are “managed services” and “block hours support.” In...


Benefits of Monitoring the Dark Web
The Dark Web is a hub for criminal activity. Even if your business is legitimate, you can't ignore the Dark Web entirely. This article...


What Does a Data Breach Look Like
Part of the problem with a data breach is that your business doesn’t know about it until it’s already happened – sometimes well after....


Common Cybersecurity Myths Debunked
In many areas of our lives there are myths that we accept as fact. Some of these are actually quite dangerous: believing that lightning...


Avoid Getting Your Cyber Insurance Payout Declined
Cyber insurance policies have existed since the early 2000s. Businesses going online wanted safeguards against risks associated with...


Data Breaches Are Getting Worse: Know the Basics
The exposure of sensitive information can be disastrous for individuals, businesses, or governments. Yet data breaches aren’t going away....


Making the Most of Microsoft Lists
If you have Microsoft 365 but aren’t using Microsoft Lists, you could be missing out. This useful feature, which is included with your...


Beyond the Ransom: Dealing with Ransomware’s Aftermath
Ransomware is on the rise. The estimated 304 million worldwide attacks in 2020 represented a 64% increase. These attacks are growing more...


What to Do About the Widening IT Skills Gap
The importance of information technology in meeting business objectives continues to grow. Regrettably, the shortfall in professionals...


Small Business Can’t Sacrifice Cybersecurity
For small businesses, it can be tempting to postpone cybersecurity efforts. There are many common excuses: “There’s so much to do,”...

Ready for technology you can rely on?
If you’re looking for stable systems, stronger security, and a partner that takes ownership of your environment, we’d welcome a conversation.
bottom of page