Posts

Showing posts from January, 2020

Slappey Communications acquires RevTel and Presidium Networks:

Image
Slappey Communications acquires RevTel and Presidium Networks: Slappey Communications is pleased to announce the acquisition of two successful telecommunication companies, Presidium Networks in Lakeland Florida, and VOLstate/RevTel in Dayton Tennessee. Acquiring these two companies allows Slappey to expand further than just local businesses, but to the entire Southeast. Slappey was founded in 1983 by Bill Slappey and is now run by his son Will Slappey and Slappey continues to grow as the leading provider of technology and telecommunications to businesses. The acquisition of these two companies happened within the last six months, and Slappey’s vision to be the best hosted PBX and Managed IT has been enhanced.   “We are very excited for the future of RevTel. Our customers will be well served by the combined company as Slappey brings added resources and personnel, which will help us continue to serve our growing customer base. Slappey adds approximately 50 new employ

Cyber insurance 101

Image
Cyber insurance 101 What is cyber insurance With cybercrime becoming a major threat to businesses across the world, irrespective of their size, cyber insurance is fast becoming a necessity more of a necessity than a choice. However, the concept of cyber insurance is still fairly new and not many SMBs are aware of its benefits. Cyber insurance is an insurance that covers your liability in the event of your business becoming a victim of cybercrime. For example, a data breach puts you at risk of lawsuits, makes you liable to your customers/other parties whose data has been compromised because of/via your organization. Cyber insurance covers the financial aspect of such liabilities, making it easier for you to deal with them. Why do you need cyber insurance Many organizations think of cyber insurance as an added cost. They believe they don’t need it for various reasons. Bigger organizations think their IT security measures are watertight and they won’t fall victim to cybercrime, and they a

Website cloning: Don’t fall for that trap!

Image
Website cloning: Don’t fall for that trap! Have you watched one of those horror movies where the something impersonates the protagonist only to wreak havoc later? Well, website cloning does the same thing--to your business--in real life. Website cloning is one of the most popular methods among scammers to fleece you of your money. As the name suggests, the cybercriminal first creates a ‘clone’ site of the original one. There can be a clone of any website, though retail shopping sites, travel booking sites and banks are the favorites of cybercriminals. The clone site looks exactly like the original one, barring a very miniscule change in the url. Next, they will create a trap intended to get unsuspecting victims to visit the clone site. This is usually done via links shared through emails, SMS messages or social media posts asking them to click on a link to the clone site. The message urges the recipient to take an action. For example, a message that presents itself as though it is from

BYOD=Bring your own disaster?

Image
BYOD=Bring your own disaster? Workplaces today have changed. They extend beyond the working hours, beyond the cubicles. Whether you are commuting to work or even vacationing, chances are you or your employees take a break from the break to reply to those important emails that require ‘immediate action’. Plus, there may even be employees who are not even on the same continent as you. What does all this mean for your business in terms of IT security? Does BYOD translate to bring your own disaster to work? This blog explores the risks of BYOD culture and offers tips on how you can avoid them. When you adopt a BYOD culture at your business, you are opening the virtual floodgates to all kind of malwares and phishing attacks. Your employee may be storing work-related data on their personal devices and then clicking a malicious link they received on their personal email or (even whatsapp in case of tablets or smartphones) and put your entire network at risk. Secondly, you cannot control how