Coordinated Headquarters Showroom

Coordinated Blog

May I Take Your Temperature?

on Jun 15, 2020 3:21:42 PM By | Kirk Studebaker // VP of Sales | 0 Comments | Security
Part of being an office technology provider is keeping up with the needs of your customer and making sure that you can source what they need.
Read More

Start your year with a detailed network security audit

on Jan 20, 2020 4:00:00 PM By | Kirk Studebaker // VP of Sales | 0 Comments | Security IT & Network Services Management
Did you know, in 2018 alone, there were 27 million personal data records exposed. As companies become increasingly reliant on technology, it’s more important than ever to make sure that your networks are adequately protected against security breaches and cyberattacks.
Read More

CEOs, Do You Have Keys to Your Own Network?

on Jan 10, 2020 8:15:44 AM By | Kirk Studebaker // VP of Sales | 0 Comments | Security IT & Network Services Management
With the mountain of responsibilities in front of modern CEOs along with the lack of time that many have, it's no wonder lower priority initiatives take a backseat or get outsourced. But are you overlooking some critical aspects of your business that keep it running and secure? Can you answer the following question: Who's holding the keys to your network? If you can't answer that confidently then you could have a potential problem on your hands — a big problem. You have heard about cybercrime and threats to your business on the web, but do you have a clear idea of how your network was set up, who holds the keys to your network, and how you can access your network? Keeping in direct contact with your IT department whether internal or external is extremely important. Your team might know who holds the keys to your network, but if you don't know, then who are you going to call? How will you have a potential security threats dealt with if you don't know who to turn to?
Read More

Is The Network Used by Your Remote Workers Safe? 5 Things You Should Know

on Dec 10, 2019 12:03:12 PM By | Kirk Studebaker // VP of Sales | 0 Comments | Security IT & Network Services Management
Remote workers can bring a lot of value to the workplace, they’re cost-efficient, can work from a variety of locations, and can frequently show signs of increased work productivity. That being said, there is some risk associated with employees working outside the office. The main risk is that you are unable to control the hardware or wireless connections used by your employees working remotely.
Read More

Understanding the dark web

on Oct 8, 2019 1:00:00 PM By | Kirk Studebaker // VP of Sales | 0 Comments | Document Management Security
Most people have heard of the dark web as it is typically mentioned in crime movies and tv shows. The connotation is often with illegal activities, a place where you can obtain drugs and weapons but there is more to the dark web than we are often led to believe.
Read More

Eight Myths About Cybersecurity

on Sep 4, 2019 8:55:00 AM By | Coordinated Business Systems | 0 Comments | Security
Cybersecurity can seem like a mystery full of misconceptions and misinformation. It’s integral for businesses to have a cybersecurity strategy, but businesses still have issues with cybersecurity threats despite having action plans in place.
Read More

What Does That “New Car Smell” Have to Do With SMB Data Backup and Network Security?

How do you prefer to acquire a new vehicle? Your preference could help you understand your choices when it comes to your information technology infrastructure. Are you the traditional type who likes to own your vehicle? You prefer to pay your car off in full and (eventually) enjoy not having a monthly note? Of course, as your vehicle ages, you’ll usually pay more for repair and maintenance. You could also outgrow your purchase. For example, how many of you started with something small and sporty, had kids, and then realized you needed something with a bit more room and cargo capacity? Hello, minivan (or SUV). Or do you prefer to lease and acquire something new every few years? You always have a monthly note to pay, but the vehicle will always be under warranty and repair/maintenance is often included for routine checks. What does this have to do with your IT infrastructure, especially your network infrastructure and backup and recovery?
Read More

Cyber Extortion: 4 New Ways Cybercriminals Are Ripping Off SMBs

on Apr 17, 2019 9:18:00 AM By | Dan Stoy, Solutions Specialist // Managed Network Services | 4 Comments | Security
Cybercriminals are still coming for your customer and business data. They are continuing to attack with ransomware delivered via email and other phishing scams. Overall ransomware numbers are dropping, though that indicates a shift in criminal strategy from focusing on consumers to focusing on businesses (where the money is). However, there are signs that people are FINALLY getting the message that clicking on every link in a suspicious email is a bad idea. The success of attacks via email are declining. That doesn’t mean these crooks are giving up on their efforts to steal your data and expose your business to legal risk. Nope. It means they are switching up how they attack you. Here are four new ways cybercriminals are plotting to take what’s yours.
Read More

4 Tips to Help Your Business Minimize the Cybersecurity Hiring Gap

on Apr 10, 2019 8:30:00 AM By | Kirk Studebaker // VP of Sales | 1 Comment | Security IT & Network Services Management
What’s your plan for cybersecurity planning? There aren’t enough qualified cybersecurity professionals in the world for all of the businesses that need to hire one to hire one (hint: that would be every business). We’ve detailed this cybersecurity hiring gap in a post last year. While efforts are being made to close the gap, the demand for cybersecurity experts continues to exceed supply. As a small to medium business, what does this mean for you? You will have a hard time recruiting and retaining top-notch cybersecurity staff. Since every business is a potential target for cybercriminals and every business has data (customer details, financial information, etc.) of interest to cybercriminals, how do you keep your business’ data secure from cybercriminals without in-house expertise? Here’s a short list of do’s (and one don’t) to minimize the effects of this talent gap.
Read More