7 New Year’s resolutions to keep your company’s data safe

In our first post of 2019, we laid out 4 areas of cybersecurity threats to watch out for in 2019; but telling you about threats isn’t enough to help you combat the malicious actors out there, so we also promised some New Year’s resolutions to help. So, here you are: 7 resolutions to help keep you digitally safe in 2019: … Read More

4 cybersecurity threats to watch out for in 2019

2019 hacking threats

2018 saw a glut of cybersecurity disasters at some of the highest levels of industry and government. From the ~$10 billion NotPetya debacle to Marriott’s 500-million-guest-record theft (which actually started in 2014 and lasted 4 full years, to be fair), it was a banner year for digital criminals. This dangerous environment has cybersecurity as a top item on a lot of … Read More

Is voice hacking the next line of attack for threat agents?

voice hacking

It’s a brave new technological world out there, and it seems to reinvent itself every couple of years. What was inconceivable only a few years ago goes from Hollywood fantasy to ubiquity in the proverbial blink of an eye. Virtual assistants like Iron Man’s J.A.R.V.I.S. leapt off the screen and into our homes via Alexa and Google Home. James Bond … Read More

$10 billion lost, a global supply chain crippled, and a miracle mistake: A NotPetya primer — cyberattack of the century

NotPetya Maersk

If it hadn’t been for Somali pirates, Navy Seals or the Tom Hanks movie Captain Phillips, chances are you probably wouldn’t have heard of A.P. Moller–Maersk Group, or ‘Maersk’ for short. It’s one of those companies content to work in the background, unnoticed and unknown, while at the same time fueling the entire world economy. It’s one of the largest intermodal logistics … Read More

Why hackers target you through IoT, how to spot a breach and how to protect yourself

IoT

In our most recent post, I walked you through the promise of the Internet of Things (IoT) from a consumer perspective before relaying a seemingly crazy anecdote about the increasingly creative (and nefarious) ways hackers are using IoT devices as access points to otherwise secure networks safeguarding sensitive data. It’s an important first step — recognizing IoT as the vulnerability … Read More

IoT does some pretty awesome stuff… and opens you up to all kinds of risk

IoT

The Internet of Things (IoT) has been on the horizon for years —  in some ways, decades even. From fictional depictions as far back as the Jetsons to the promise of a smart home with intuitive tech that not only responds to your every command but can anticipate all your needs, it’s been a tantalizing frontier in consumer electronics for … Read More

Leverage and Lindstrom Complete First Full Quarter as Combined Entity

Merger Image

Leverage Technologies has built its services with emphasis on strategic planning, while Lindstrom grew its practice upon a reputation for reliable IT systems and support. The merger has come about based upon a long-standing relationship started in 2010. The new Leverage Technologies will have strengthened capabilities to include on-site IT support, an in-house escalation path for deep technical support, and … Read More

The Cloud is NOT for Everyone

The cloud concept has a lot of momentum lately, but it’s not the right solution for everyone.  So what determines if the cloud is right for you?  There are a few key characteristics of your business that will push you towards a cloud implementation.  How far you go is determined by your need for those characteristics.  The important thing to … Read More

Proactive Service vs Reactive Support

When we talk with business leaders we often hear about their perception of Proactive Service vs Reactive Support.  Many business have been told that Proactive Support includes things like patch updates, anti-virus checks, computer monitoring, and so on.  While you can consider these items to be proactive in nature, doing them independently doesn’t offer much value to the end result … Read More