Blog

Microsoft Products Reaching End of Life For 2020. What Does This Mean?

By CRA | December 31, 2019
Microsoft has announced End of Support for Office 2010 and has added it to the Microsoft 2020 End of Life List. The tech giant is now urging users to move to the Office 365 ProPlus platform that promises some exciting new developments owing to the fact it is cloud-based and has some powerful Artificial Intelligence capabilities. The good news is that the transition is not only smooth, but it...

Cybersecurity Best Practices: Protecting Client Information

By CRA | March 07, 2019
Cybersecurity breaches are on the rise. From small businesses to giant corporations, everyone is vulnerable to cyber attack. You don’t want to believe it but the unfortunate truth is: it could happen to you. Being aware of this is a good start. But if you’re faced with the reality of a cyber attack, you and your clients will be in a much better position if you have a privacy breach preparedness...

The Importance of Backups: Restoring Data After A Breach

By CRA | November 21, 2017
In one year, from April 2016 to August 2017, 14 million small businesses were hacked. Small- to medium-sized businesses have a high risk of cyber attacks for a host of reasons. The combination of the number of attacks and the risk has moved Congress to seek legislation creating a set of resources and guidelines for small businesses to help keep them safe from the myriad attacks that they face....

The 17 Types of Cyber Attacks You're Likely To Face

By CRA | November 14, 2017
When a cyber security attack happens to a big company it hits the news and gets plenty of air time. In a world of virtual money hundreds of thousands can be affected by a data breach. But it’s not just big banks and dating sites that are at risk. Small to medium-sized businesses are the likeliest targets of attacks. What kinds of cyber attack exist and how can you prevent them? Here are the #...

Why Are SMBs Targets For Hackers?

By CRA | November 08, 2017
Small to medium-sized businesses, or SMBs, are at the most risk for hacks. If your business has fewer than 1000 employees, there’s a good chance that you’re at risk. Let’s explore why and how hackers target SMBs and how to tighten up your enterprise to avoid a breach. What Makes SMBs At Risk For Hacking One of the main reasons small to medium businesses are at risk for hacking is a lack of...

4 Ways To Protect Your IoT Devices

By CRA | November 02, 2017
Ten years ago the first iPhone hit the market and our lives changed. Sure, there were BlackBerry and Treo phones before then that hinted at the capabilities of internet-capable phones but it was the iPhone that opened us to all the possibilities. The most incredible of those possibilities? The Internet of Things: the network of devices that can communicate with each other. The IoT includes cars,...

Is Your Business Prepared for a Cyberattack?

By CRA | July 18, 2017
Businesses across all industries are vulnerable to cyberattacks. The threat is particularly great for small and mid-sized businesses that can’t divert resources into full-time, in-house IT security teams. The good news is that managed service providers (MSPs) help overcome these security obstacles. Outsourcing means you’ll have top of the line security solutions for whatever issues arise. A...

How to Identify Spam and Safe from Spoofing, Phishing and Pharming

By CRA | June 27, 2017
In the early days of the internet, the dangers of spam were easy to avoid by following a few simple rules. You could dodge most security risks and identity theft by deleting unsolicited attachments and offers from “Nigerian princes.” Then, spam-recognition algorithms became advanced enough to rid us of most of the chaff in our inboxes. All the while, spammers and identity thieves developed more...

IT Security Best Practices: Saving, Sending & Sharing Files

By CRA | June 20, 2017
Information technology has become a vital part of everyday life and business. The barrier to entry is lower than it’s ever been and there are numerous free technology solutions available for saving files, sharing files, and sending files. Many offer flexibility and accessibility, but it’s also critical to ensure your files are secure. Here we describe strategies and IT security best practices for...

SMBs: Reduce your risk by implementing a security solution

By CRA | April 17, 2015
According to a recent Symantec report “2015 Internet Security Threat Report”, 60% of all targeted attacks impacted small and medium-sized businesses (SMB), many of which were not prepared and lacked security practices. At CRA, we are seeing more and more attacks targeting SMBs at a rapid rate. It is vital that SMBs have a plan and security implemented to thwart off these attacks. Security needs...
1