TopTop

Burgess Computer

All
  • All
  • Burgess Technology Blog
  • IT Consulting
  • IT Security
  • IT Services
  • Latest IT News
  • Office, Email, & Web Hosting
george-prentzas-SRFG7iwktDk-unsplash

Best Practices for Cyber Security Audits 

Insurance companies are increasingly requiring businesses, particularly those in the medical and financial sectors, to have comprehensive policies to mitigate the risk of cyber-attack. Minimum requirements for cyber insurance are becoming increasingly complex. Frequently, annual cyber audits are implemented to ensure best practices are in place. The following is a list of the key protocols Continue Reading

security monitoring

What EDR Means For Your Business’ Security

  What is EDR? Endpoint Detection and Response (EDR), is an endpoint security solution which continuously monitors end-user devices to detect and respond to cyber threats, including ransomware and malware. This solution: • Records and stores endpoint-system-level behaviors • Uses various data analytics techniques to detect suspicious system behavior • Provides contextual information • Blocks Continue Reading

Email security flyer graphic

Considering An Email Protection Platform For Your Business

Email attacks are becoming increasingly complex, with many designed to target users and bypass email security gateways. You need to stay ahead of cyber criminals to protect your business and data.  Our email protection platform provides the most comprehensive protection against all 13 email threat types, from spam and ransomware to socially engineered threats such Continue Reading

michal-kubalczyk-WecngmAT-KY-unsplash

How External Vulnerability Scans Protect Your Business

Hackers continue to evolve their attack methods to capitalize on weaknesses in the external networks of governments and organizations worldwide. External vulnerability scans assess the surface area your network presents to the world and the larger internet. They are critical to taking a proactive IT security approach to protecting your business from cyber threats. What Continue Reading

ksenia-yakovleva-GJUi5qfkh-g-unsplash

Why Cyber Criminals Love the Holiday Season

The holiday season can be a time of joy, family gatherings, lovely lights and relaxing downtime. It can just as surely be a time of high stress, low patience, understaffing, harried schedules and distraction. It’s these latter qualities which make November into January a particularly attractive time for cyber criminals. Employees are likely to be Continue Reading

daniel-jensen-NMk1Vggt2hg-unsplash

Don’t Let Your Business Be A Tech Horror Story!

Don’t Let Your Business Be A Tech Horror Story! (Implement Managed Backup & Recovery IT) Halloween seemed like a good time to review some previous content related to the scary concept of losing your data! Imagine if you will, you lose all of your client contacts, your accounting files, your point-of-sale data or all of Continue Reading

Information Technology Services

How Managed Detection & Managed Risk Work For Your Business

Our chosen process for protecting your business network is a combination of Managed Detection and Managed Risk. Here’s how it is applied. Network Inspection   Continuous network traffic inspection that detects malicious activity to/from suspicious IP addresses and domains. Log Analysis & Search  Automatically collects, normalizes, analyzes and retains log data from existing networks, systems, and Continue Reading

august 2022 banner snip

Not Too Late for Summer Rec Tech!

  Although somehow August is at its end, we here at Burgess Technology Services are not ready to let go of summer just yet. We’ve polled our staff and friends, encouraging them to tell us about some of their favorite summer recreation technology, and we’re pleased to share a few with you here. Not surprisingly, Continue Reading

Industry-specific Technology Support

Understanding Industry-specific Technology Needs

We at BTS are proud to be expert in supporting the unique needs of several specific industries, including Municipalities, Financial Institutions (especially Credit Unions), Medical and Manufacturing. In addition to the daily requirements of any business network, these industries have stringent requirements with regard to data security, federal regulation and 24/7 productivity. Burgess Technology Services Continue Reading