View Post

Hackers Actively Exploiting Your Trust in Your Managed Service Provider

What if your managed service provider, the company with access to all your computers and networks and data, was hacked? Your data would be at significant risk of also being compromised. When searching for an MSP, whether for the first time or to switch IT providers, the cybersecurity of the provider should be a paramount consideration. If they don’t have …

View Post

The Dangers Within: Insider Threats

Most business owners don’t walk around every day thinking their employees are actively attacking the company from within by stealing data to sell to competitors, skimming from the budget, misusing the company credit card or otherwise. In turn, most employees aren’t out to hurt their employers. Thus, business owners rarely think of insider threats to their information security. That’s a …

View Post

Applied Tech Lends a Helping Hand to Second Harvest Foodbank

Second Harvest Foodbank is a local non-profit with the mission to fight hunger for our communities throughout southern Wisconsin. With 1 of 6 children in southern Wisconsin facing a hunger crisis on a daily basis, Second Harvest Foodbank is doing all they can to provide meals for hungry children and adults alike. Since 1986 Second Harvest Foodbank of Southern Wisconsin …

View Post

How Your Employees Can be Your Biggest Threat

Like all organizations, our clients face the growing threat of falling victim to a cyber-attack. If organizations as large as Experian and the City of Atlanta can be hacked, it’s likely you can be too. Let’s be honest: there’s no silver bullet to cybersecurity. Even with the best security measures in place, you’re at risk, because so much of those …

View Post

How Important is Security to Your Business? Quite a Bit

Your business likely maintains quite a bit of information on your customers, clients or patients, including personally identifiable data. Depending on your industry, your business may be required to meet certain regulatory standards – such as HIPAA, PCI, and ISO standards – on maintaining the security of those records. A data breach can mean big costs in money, productivity and …