What is Microsoft Secure Score and Why Does it Matter?

Microsoft Secure Score is an evaluation of a companies security, the higher the score the more secure your actions and system are. To receive access you have to be assigned to a specific role in Azure Active Directory. It works in a variety of different ways, including: Configuring recommended security features Doing security-related tasks Addressing […]

10 Ways to Keep Your Network Safe From Cyber Criminals

There are several basics strategies that every business should implement to keep their network secure. Becoming a victim of a cyber security attack isn’t a matter of if, but when. With the number of attacks increasing on a daily basis, everyone is a target. There are some very simple things you can implement to increase […]

What to do When an Employee’s Device is Stolen

With so many people working remotely, personal and company devices have access to a lot of company data. Some even have private business information stored on the device itself. This scattering of business data opens the company up to some serious security risks. One of the biggest risks comes from device theft. When a device […]

SECURITY ALERT – Mimecast

Attacks on the vendors of managed services providers like Protek Support continue to increase in both severity and frequency. This week’s target was unfortunately the spam filtering service Mimecast, which the majority of Protek Support clients utilize. As always, Protek takes these notifications very seriously and immediately looked at our client’s Mimecast accounts to verify […]

3 Reasons Employees Fall for Phishing Attacks

3 Reasons Employees Fall for Phishing Attacks A phishing attack is one of the most common types of cyber security threats. Phishing is the use of bait information to trick the recipient into opening, clicking on, or responding to a fraudulent email, phone call or message that is often crafted to look legitimate. Commonly, phishing […]

What is social engineering? (And four defense measures.)

What is social engineering? (And four defense measures.) In the context of IT security, social engineering is the manipulation of an employee to get them to divulge confidential information or mistakenly perform some action, usually involving the transfer of funds. Cyber criminals rely on people’s trust to get them to reveal passwords, account details, or […]

Three Core Elements of Your Cyber Security Awareness Program

Data Breach

Three Core Elements of Your Cyber Security Awareness Program Security awareness training is essential for organizations of all sizes. Human error remains the root cause of most major security incidents. Therefore, companies need to invest in cyber security technology and in building a “human firewall” in their organization, through security awareness, education, and development. Some […]

What is the NIST Cyber Security Framework? (And why it matters)

IT Outsourcing Services in Salt Lake City

  What is the NIST Cyber Security Framework? (And why it matters) Business leaders and managers should pay close attention to technical standards in various areas of their business, whether the standards cover manufacturing quality control, HR best practices, or internal operations, to name just a few. A technical standard is usually a formal document […]

5 Key Advantages of World-class Endpoint Management Software

IT Consulting Salt Lake City

5 Key Advantages of World-class Endpoint Management Software Technology is the life blood of modern business. Firms of all sizes should think strategically about information technology investments and partnerships. For small businesses, outsourcing technology management to an IT service provider is a smart move. IT service providers deliver deep technical expertise, proactive service management, and […]

Mobile Device Management: What is it and Why You Need it?

Mobile Device Management: What is it and Why You Need it? Now more than ever, organizations must implement cyber security and corporate data protection for a broadly distributed workforce. During the COVID-19 pandemic, millions of employees globally have quickly made the shift from corporate offices to working from home. Working from home is the new […]

This will close in 0 seconds