TopTop

Matt Rice, CTO

All
  • All
  • Burgess Technology Blog
  • IT Consulting
  • IT Security
  • IT Services
  • Latest IT News
  • Office, Email, & Web Hosting
Protecting Your Network

Protecting Your Network with a Team-based Response

We recently shared a series of blog posts on protecting your network from phishing attacks specific to Impersonation Protection. We’d now like to spotlight incidents experienced by BTS clients, actions taken, and what precautions could help avoid such risks in the future. We share the first such case below: The Scenario BTS had just onboarded Continue Reading

Municipal Cyber Attack

Impersonation Protection: Municipal Cyber Attack

We wrap up our three-part series sharing real-world examples of impersonation fraud with a look at a municipal cyber attack. Below is an example of such an attack, along with explanations of the methods of attack and appropriate responses. Impersonation Protection is a cybersecurity solution designed to protect organizations from email-based impersonation attacks. These attacks Continue Reading

credit union cyber attack

Impersonation Protection: Credit Union Cyber Attack

We continue our three-part series sharing real-world examples of impersonation fraud, along with explanations of the methods of attack and appropriate responses. Impersonation Protection is a cybersecurity solution designed to protect organizations from email-based impersonation attacks. These attacks typically involve cybercriminals pretending to be trusted individuals or entities using social-engineering tactics to deceive recipients into Continue Reading

Email impersonation protection

Impersonation Protection: CEO Fraud

Impersonation Protection is a cybersecurity solution designed to protect organizations from email-based impersonation attacks. These attacks typically involve cybercriminals pretending to be trusted individuals or entities using social-engineering tactics to deceive recipients into taking harmful actions, such as revealing sensitive information, transferring funds, or clicking on malicious links. A robust cybersecurity plan uses AI-Based Comprehensive Continue Reading

security awareness

Security Awareness. Are You Leaving the Door Open for Cyber Criminals?

We can think of your business network as a house containing many valuables. The keys to your kingdom, really. It is prudent to have excellent locks, a camera system, an alarm system and other theft deterrents. But if you open the door for a criminal, there’s not much all those systems can do for you. Continue Reading

IT Network Security

Beyond the Firewall: Managed Risk, Detection and Response

There’s a misconception that a comprehensive firewall protocol is the one barrier you need to protect your business network. While it is true that this tool is critical to effective network security, there are many avenues through which malware and bad actors can access and corrupt your network. It’s important to be sure you are Continue Reading

israel-andrade-YI_9SivVt_s-unsplash

Top Tech Tips for the Non-Techie

This month, we’re focused on providing direction for less-techie folks on what actions they can employ to potentially save time and money, before calling in their local IT professionals. We also offer a list of scenarios where you absolutely should bring in an IT expert before you cost yourself more time and money than necessary. Continue Reading

stephanie-klepacki-Jh9U5__hStw-unsplash

Thanksgiving: Team BTS, By the Numbers

The Thanksgiving season got us to thinking about how grateful we are for our staff. Here’s some telling information “by the numbers”, about the stellar folks who serve our clients with responsiveness, experience and expertise. Did you know? Number of Fulltime BTS Team Members:      21 Average number of years in IT:      Continue Reading

alex-machado-80sv993lUKI-unsplash

Creating a Complete Backup Strategy

We have a couple of client case studies we’d like to share as cautionary tales, as well as examples of why you must perform a regular review of your backup protocols. We at BTS are big fans of Microsoft 365. You can find more information on the many tools and benefits here: Microsoft 365 from Continue Reading