Posts by David Bohn
Hacking is Not Personal: Why the Smallest Businesses are Still at Risk
Small businesses may think malicious actors will have no interest in them, but being small doesn’t protect you from cyberattacks. Hacking is not personal, and here are a few reasons why your small or medium business could be targeted.
Read MoreStolen Data – What a Business Loses in a Data Breach
Everyone knows that a data breach is bad, but have you thought about what the bad guys are actually after? Here are some of the crucial pieces of stolen data that hackers turn into a payday.
Read MoreSmartphone Attacks: Your Phone as Security Risk
Did you know that your smartphone could be targeted by malicious actors? Today we take a look at how hackers could try to steal information or access your business network through a smartphone device.
Read MoreWhat is SASE and How Will it Best Help Your Business?
As businesses rely more on remote work, maintaining high quality security is important. SASE can be a crucial idea for businesses to take advantage of in this new age of work.
Read More3 of the Best VPN Security Features for Small Businesses
Have your security tools kept up with the move to remote and hybrid work? To make sure you are getting the most out of your VPN, here are three VPN security features that any small business with remote workers should have!
Read MoreData Breach Defense for Small and Medium Businesses
Is your business protected against a data breach? Information gets stolen from companies every single day, and malicious actors will take any piece of data they can. To help improve your cybersecurity, here are a few tips on how to defend against a data breach.
Read MoreWhat Makes the Best Small Business Communication Tool?
Have you considered upgrading how your employees and clients communicate with each other? If you’re thinking about a new business communication tool or service, then here are a few key considerations that will help you make your decision.
Read More3 Strategies to Make Your IT Environment Efficient
Building out your business’ IT environment can be a hard task, but it doesn’t have to be. Here are three key strategies Robinett Consulting thinks you should keep in mind as you plan the growth of your IT Environment.
Read More3 Ways to Implement Ransomware Protection
To round out our week on ransomware, we want to talk about the best ways to defend your business from ransomware attacks. Here are three ways your business can improve its ransomware protection!
Read MoreThe Anatomy of a Ransomware Attack
To continue our week on ransomware information, we’re taking a look at the anatomy of a ransomware attack from start to finish. How do they happen? Should you pay the ransom?
Read More