What is social engineering? (And four defense measures.)

What is social engineering? (And four defense measures.) In the context of IT security, social engineering is the manipulation of an employee to get them to divulge confidential information or mistakenly perform some action, usually involving the transfer of funds. Cyber criminals rely on people’s trust to get them to reveal passwords, account details, or […]

Four Kinds of Phishing Attacks (and what to do about it)

Guided Help With Windows

Four Kinds of Phishing Attacks (and what to do about it) A phishing attack is one of the most common types of cyber security threats. Phishing is the use of bait information to trick the recipient into opening, clicking on, or responding to a fraudulent email, phone call or message that is often crafted to […]

Three Core Elements of Your Cyber Security Awareness Program

Data Breach

Three Core Elements of Your Cyber Security Awareness Program Security awareness training is essential for organizations of all sizes. Human error remains the root cause of most major security incidents. Therefore, companies need to invest in cyber security technology and in building a “human firewall” in their organization, through security awareness, education, and development. Some […]

FBI Cyber Crime Briefing: Five Big Risks for Business Leaders

FBI Cyber Crime Briefing: Five Big Risks for Business Leaders Protek recently sponsored a special briefing from cyber security experts at the FBI. The event, Cyber Crime 101: FBI Cyber Security Webinar is available on-demand here. This cyber crime briefing featured Supervisory Special Agent, Elvis Chan, from the FBI’s San Francisco, CA field office. Special […]

What is the NIST Cyber Security Framework? (And why it matters)

IT Outsourcing Services in Salt Lake City

  What is the NIST Cyber Security Framework? (And why it matters) Business leaders and managers should pay close attention to technical standards in various areas of their business, whether the standards cover manufacturing quality control, HR best practices, or internal operations, to name just a few. A technical standard is usually a formal document […]

Five Most Common Security Recommendations from Microsoft Secure Score

Five Most Common Security Recommendations from Microsoft Secure Score Microsoft Secure Score is a feature in Microsoft 365, which provides an overall measurement of an organization’s security posture. The higher the Secure Score, the better. The Secure Score is accessed from the administrator dashboard in Microsoft 365. Secure Score can be used in a number […]

5 Key Advantages of World-class Endpoint Management Software

IT Consulting Salt Lake City

5 Key Advantages of World-class Endpoint Management Software Technology is the life blood of modern business. Firms of all sizes should think strategically about information technology investments and partnerships. For small businesses, outsourcing technology management to an IT service provider is a smart move. IT service providers deliver deep technical expertise, proactive service management, and […]

Five Reasons You Need Next-Gen Anti-Virus

Five Reasons You Need Next-Gen Anti-Virus Attackers are constantly evolving and upgrading their programs and tools. Similar to how software programs are always updating, attackers need to change to continually find ways around road blocks that are being placed in their way. They are using artificial intelligence to ensure their attack is successful. Due to […]

Mobile Device Management: What is it and Why You Need it?

Mobile Device Management: What is it and Why You Need it? Now more than ever, organizations must implement cyber security and corporate data protection for a broadly distributed workforce. During the COVID-19 pandemic, millions of employees globally have quickly made the shift from corporate offices to working from home. Working from home is the new […]

What are Security Services and Why They Matter

What are Security Services and Why They Matter Our clients often ask, why do we need extra security services and software running on our firewall? Won’t the basic firewall suffice? What is a firewall? A firewall is the network security device that in most cases physically sits nearby where your high speed internet access enters […]