Every cloud provider says they’re secure, but how do you really know that they are? Well, here at Tabush Group, we know we are secure, and we’re proud to tell you why.
by Deborah Kaplan, on November 23, 2020 at 12:02 PM
Every cloud provider says they’re secure, but how do you really know that they are? Well, here at Tabush Group, we know we are secure, and we’re proud to tell you why.
by Darragh Fitzpatrick, on October 20, 2020 at 8:30 AM
by Prabhleen Saini, on October 6, 2020 at 8:30 AM
As the COVID-19 pandemic stay-at-home restrictions loosen, people have begun to venture back into offices, schools, and other public places. The pandemic created many challenges for businesses as they begin to return, such as social distancing within the office, employee health, and cybersecurity. Cybersecurity is very important to factor into your return because it is very easy for bad actors to take advantage of people who are distracted by these many changes brought about by the pandemic.
by Deborah Kaplan, on July 28, 2020 at 9:00 AM
It comes as no surprise that firms are extremely concerned about the security of their data. How do you prevent unauthorized access to your data and applications? How do you protect your firm’s data assets from natural disasters or other scenarios that would prevent you from getting to your office?
by Morris Tabush, on September 17, 2018 at 12:11 PM
A disaster in the IT world comes in many forms – natural disasters, ransomware, a cyber breach, and acts of terrorism, just to name a few. These disasters disrupt normal business and can ultimately have severe and expensive consequences on a company’s reputation and bottom line.
The bad news is many companies think these disasters can never happen to them and don’t take the proper precautions; the good news is that prevention of many disasters is attainable, and planning ensures that when there is a disaster, your company is prepared to get back to business as usual.
by Morris Tabush, on April 17, 2018 at 9:06 AM
There is an increase in the frequency and efficacy of data breaches that can bring a firm’s operations to a standstill. Data breaches are often the result of vulnerable hardware and software where security measures may be weak or out of date, presenting an opportunity to hackers and ransomware. Far too often, businesses do not realize they are victims of breaches for days or even weeks, and by then, there is often nothing that can be done to repair the damage.
by Morris Tabush, on March 29, 2018 at 9:00 AM
We recently sent a message to our clients warning them of an increase in phishing activity. We find it to be so rampant that we wanted to make this information available to the public as well. For help with your business IT and security contact Tabush Group.
Over the past few weeks, we noticed an uptick in ‘phishing’ emails, which appear to be from Microsoft Office 365 or other popular cloud service providers, trying to get recipients to provide their log in credentials or other sensitive information. While we employ many layers of defense from top vendors for email filtering and content security for our clients, the bad guys are hard at work trying to beat the security systems; and sometimes, these things get through.
We want to provide you scenarios that you and your colleagues should be mindful of. Always be suspicious of anything that appears out of the ordinary, including:
by Tabush Group, on October 3, 2016 at 9:00 AM
Did you know that October is National Cyber Security Awareness Month?
It's a great annual reminder for you to take a look at what you and your company are doing to protect your business and systems from potential cyber attacks that could cripple your operations and cost you thousands of dollars in lost revenue.
Follow along as our team of passionate technology professionals share insights and expertise on topics related to cloud computing, cybersecurity, and IT best practices for small to mid-size firms.