TopTop

Burgess Technology Blog

All
  • All
  • Burgess Technology Blog
  • IT Consulting
  • IT Security
  • IT Services
  • Latest IT News
  • Office, Email, & Web Hosting
Email security flyer graphic

Considering An Email Protection Platform For Your Business

Email attacks are becoming increasingly complex, with many designed to target users and bypass email security gateways. You need to stay ahead of cyber criminals to protect your business and data.  Our email protection platform provides the most comprehensive protection against all 13 email threat types, from spam and ransomware to socially engineered threats such Continue Reading

michal-kubalczyk-WecngmAT-KY-unsplash

How External Vulnerability Scans Protect Your Business

Hackers continue to evolve their attack methods to capitalize on weaknesses in the external networks of governments and organizations worldwide. External vulnerability scans assess the surface area your network presents to the world and the larger internet. They are critical to taking a proactive IT security approach to protecting your business from cyber threats. What Continue Reading

ksenia-yakovleva-GJUi5qfkh-g-unsplash

Why Cyber Criminals Love the Holiday Season

The holiday season can be a time of joy, family gatherings, lovely lights and relaxing downtime. It can just as surely be a time of high stress, low patience, understaffing, harried schedules and distraction. It’s these latter qualities which make November into January a particularly attractive time for cyber criminals. Employees are likely to be Continue Reading

daniel-jensen-NMk1Vggt2hg-unsplash

Don’t Let Your Business Be A Tech Horror Story!

Don’t Let Your Business Be A Tech Horror Story! (Implement Managed Backup & Recovery IT) Halloween seemed like a good time to review some previous content related to the scary concept of losing your data! Imagine if you will, you lose all of your client contacts, your accounting files, your point-of-sale data or all of Continue Reading

Information Technology Services

How Managed Detection & Managed Risk Work For Your Business

Our chosen process for protecting your business network is a combination of Managed Detection and Managed Risk. Here’s how it is applied. Network Inspection   Continuous network traffic inspection that detects malicious activity to/from suspicious IP addresses and domains. Log Analysis & Search  Automatically collects, normalizes, analyzes and retains log data from existing networks, systems, and Continue Reading

august 2022 banner snip

Not Too Late for Summer Rec Tech!

  Although somehow August is at its end, we here at Burgess Technology Services are not ready to let go of summer just yet. We’ve polled our staff and friends, encouraging them to tell us about some of their favorite summer recreation technology, and we’re pleased to share a few with you here. Not surprisingly, Continue Reading

Industry-specific Technology Support

Understanding Industry-specific Technology Needs

We at BTS are proud to be expert in supporting the unique needs of several specific industries, including Municipalities, Financial Institutions (especially Credit Unions), Medical and Manufacturing. In addition to the daily requirements of any business network, these industries have stringent requirements with regard to data security, federal regulation and 24/7 productivity. Burgess Technology Services Continue Reading

IT Security

What Does Network Monitoring Mean for My Business?

In the March blog, we talked about Managed Services and why they are a cost-effective and secure choice for ensuring the safety and smooth-running of your business network. This month, we want to take a deeper dive into one area of managed service, Network Monitoring. To help us understand monitoring from a practical perspective, as Continue Reading

MS Pop up 2022

Current Scams, Hacking and Phishing Attacks

In the IT Support sphere, we always need to be aware of current and evolving threats to your business network, so it’s always a good time to be taking a look at the most recent iterations of spam, scams, phishing and hacking attempts. Here’s what we’re seeing a lot of lately: Trusted Vendor Pop-ups You’re Continue Reading