TopTop

Burgess IT Blog

AdobeStock_70757359

Password Best Practices & Benefits of Two Factor Authentication

Let’s be honest. Passwords can be daunting, especially when it seems like every system has different requirements. Special characters, varying lengths, mixture of upper and lower case, numbers, symbols – it’s enough to make anyone dizzy with confusion. Using a few “tricks of the trade” you can learn how to create stronger passwords that keep Continue Reading

data loss

Data Loss, Encryption & Disaster Recovery

What is Data Loss? Data loss is a topic that many people don’t like to think about and often don’t – until it’s too late. Data loss can be as “simple” as a corrupt Microsoft Word document that can no longer be opened. This may be fine if it’s an old college term paper that Continue Reading

hybrid IT services Coworking diagnosing server hardware

Hybrid IT Services

Hybrid IT Services Some clients rely on BTS for all their IT needs, from network design & implementation to help desk services to on-going maintenance & monitoring. Others may utilize an in-house IT person but still look to BTS for services that their IT person can’t provide. We tend to refer to this as “hybrid” Continue Reading

old computer on a desk

The Cost of Old IT Equipment

When it comes to your business, watching expenses is crucial. Each and every cost needs to be understood and assessed regularly. In today’s world, we know that IT is a necessary expense, but there’s a hidden cost many businesses may overlook – the cost of using old IT. When I meet with a client, it’s Continue Reading

business class firewall

Having a Business Class Firewall is Critical to Business IT Security

Businesses today rely on internet connections to perform vital daily operations. Business owners and executives need to ensure their internal networks are protected from the many external threats that exist. The first line of defense is knowing when it’s okay to use a router and when a business class firewall is needed. When I am Continue Reading

inbox email scams

Email Scams and Security Awareness Training

Early on, email scams were simple. You may receive an email saying something to the effect of “your long, lost rich uncle who lived in another country passed away and you needed to send your bank information to receive an inheritance.” The emails contained numerous spelling and grammar mistakes and the email composer didn’t speak Continue Reading

it security

Technology End-of-Life Guide

Technology end-of-life is an important aspect of your network and should be managed closely. If software or hardware is in its final stages of existence, or has already expired, it needs to be replaced. Once it reaches end-of-life, the manufacturers of the software/hardware will no longer offer any type of support, leaving your network vulnerable Continue Reading

windows 7

Windows 7 Extended Support Expiring

Does your PC still operate on Windows 7? If so, it’s time to start planning. In 2015, Microsoft stopped mainstream support for Windows 7. This means it stopped offering free phone and online support as well as non-security related updates. Since that time, Microsoft has continued to offer security updates for the operating system. This Continue Reading

phishing

Social Engineering Phishing Email Affects Woolwich Family

Phishing email scams are a constant threat to anyone with an email account. These email scams have evolved over the years from simple tactics to much more sophisticated plots using social engineering. In August 2018, one family in Woolwich fell victim to an email scam that we should all be aware of. While in the Continue Reading