IT Solutions Blog

Why Human Error is Your Biggest Security Vulnerability… and What to Do About it
As IT security professionals, our focus every single day is keeping our clients safe, secure, and productive. As cyber criminals become more sophisticated, we’re constantly monitoring threats, identifying vulnerabilities, and mitigating risk. But the fact of the...

Cybersecurity 101: Don’t Be The Low-Hanging Fruit
Small business owners today are more concerned about cybersecurity than ever before - and they should be! That’s because, unfortunately, cyber-crime is at an all-time high and cyber-criminals are more sophisticated than ever before. So business owners wonder,...

Don’t Hire an IT Vendor Just Because You “Like” Them
Most small business owners, when they’re looking for a vendor to support their business, default to the old adage - “hire someone you know, like, and trust.” This is especially true here in Charlotte, North Carolina, which is where we operate - it’s a relationship...

Russia/Ukraine: Don’t panic. Prepare.
Hi All, I just finished up another large conference call with over 4000+ people from IT Services Providers around the country. Everyone is worried about what additional risks the war in Ukraine and the West’s responses against Russia poses to small business in the...

Important Update for MS365 Users
Important Update for MS365 Users We've got an important update for Microsoft 365 users: prices are increasing in March! This is Microsoft's first price increase in ten years - and it's expected to be an increase of about 20 - 40%, depending on which of their products...

Should My Business Buy Cyber Insurance in 2022? 5 Facts to Know
Should your business buy cyber insurance in 2022? That’s a good question. And to give an answer, we’d need to have a conversation about your business and its unique risks—which is something a blog post can’t do. So, in lieu of sitting down with you, let...

How to Respond to a Security Breach: A Senior Network Engineer Explains
From the recent Robinhood incident to the Colonial Pipeline disaster, security compromises happen. Even with cybersecurity measures, your business can still experience loss. (For an example of what I’m talking about, read what happened to our client here.) Are...

What to Do after a Cyberattack: A Panel Discussion on Cyber Insurance and Incident Response
"Should my business purchase cyber insurance?" "If I have cyber insurance, what should I do after a breach?" "What’s the role of my IT provider after an incident?" If you have questions like these, be sure to watch this webinar where David Short, Patrick O'Brien,...

10 Takeaways from My Conversation with CISA and the NCSA on Ransomware
Last month, I participated in a panel discussion hosted by the National Cyber Security Alliance (NCSA). The topic of the day? Ransomware. Domingo Rivera from the Cybersecurity and Infrastructure Security Agency (CISA) and I had a great conversation. And...

Your Backup Software Probably Isn’t Providing What You Need. Here’s How to Know…
Your backup software probably isn’t providing what you need. I know that’s a strong statement. But it’s rooted in reality. Too many companies think that their data is safe because they're using a backup tool. But their data is actually in peril, which could...
Sign Up to Receive our Blog
Look No Further
Let's start a conversation today
Contact Us
6211 Carmel Rd
Suite 201
Charlotte, NC 28226
Phone: 704-464-3075
Email: info@weareproactive.com