Burgess Technology Blog

  • All
  • Burgess Technology Blog
  • IT Consulting
  • IT Security
  • IT Services
  • Latest IT News
  • Office, Email, & Web Hosting
Email impersonation protection

Impersonation Protection: CEO Fraud

Impersonation Protection is a cybersecurity solution designed to protect organizations from email-based impersonation attacks. These attacks typically involve cybercriminals pretending to be trusted individuals or entities using social-engineering tactics to deceive recipients into taking harmful actions, such as revealing sensitive information, transferring funds, or clicking on malicious links. A robust cybersecurity plan uses AI-Based Comprehensive Continue Reading

security awareness

Security Awareness. Are You Leaving the Door Open for Cyber Criminals?

We can think of your business network as a house containing many valuables. The keys to your kingdom, really. It is prudent to have excellent locks, a camera system, an alarm system and other theft deterrents. But if you open the door for a criminal, there’s not much all those systems can do for you. Continue Reading

IT Network Security

Beyond the Firewall: Managed Risk, Detection and Response

There’s a misconception that a comprehensive firewall protocol is the one barrier you need to protect your business network. While it is true that this tool is critical to effective network security, there are many avenues through which malware and bad actors can access and corrupt your network. It’s important to be sure you are Continue Reading


Top Tech Tips for the Non-Techie

This month, we’re focused on providing direction for less-techie folks on what actions they can employ to potentially save time and money, before calling in their local IT professionals. We also offer a list of scenarios where you absolutely should bring in an IT expert before you cost yourself more time and money than necessary. Continue Reading


Thanksgiving: Team BTS, By the Numbers

The Thanksgiving season got us to thinking about how grateful we are for our staff. Here’s some telling information “by the numbers”, about the stellar folks who serve our clients with responsiveness, experience and expertise. Did you know? Number of Fulltime BTS Team Members:      21 Average number of years in IT:      Continue Reading


Creating a Complete Backup Strategy

We have a couple of client case studies we’d like to share as cautionary tales, as well as examples of why you must perform a regular review of your backup protocols. We at BTS are big fans of Microsoft 365. You can find more information on the many tools and benefits here: Microsoft 365 from Continue Reading

IT network security,

How Artificial Intelligence Can Protect Your Network in Real Time

Everyone is a target for today’s most sophisticated threats. Companies, regardless of size, are vulnerable, and it is imperative to take precautions before it is too late. A recommended solution combines powerful layers of artificial intelligence and domain fraud visibility into a comprehensive cloud-based solution that guards against spear phishing, impersonation attempts, business email compromise, Continue Reading

2023 Junebanner snip

The BTS Guide to Summer Fun Apps!

  It’s that time of year again! Time for summer fun and travel. We’ve brought you some great resources over the years, sharing summer and recreation apps and tools via our blog and the IT Sucks Podcast. We’ve shared links to that content below, and also wanted to bring a few additional and new apps Continue Reading


Best Practices for Cyber Security Audits 

Insurance companies are increasingly requiring businesses, particularly those in the medical and financial sectors, to have comprehensive policies to mitigate the risk of cyber-attack. Minimum requirements for cyber insurance are becoming increasingly complex. Frequently, annual cyber audits are implemented to ensure best practices are in place. The following is a list of the key protocols Continue Reading