Seven Questions to Ask Any IT Services Firm Before Signing a Penetration Testing Service Agreement
Although stopping users from accidentally exposing networks and systems is important to cybersecurity, it isn’t enough. Cybercriminals are also attacking their targets — corporate data, networks and systems — directly. Penetration testing is a proven mechanism for reducing the risk of a successful attack. Penetration testing doesn’t have to be onerous. Today, highly sophisticated, specialized […]
Department of Defense (DoD) Rolls Out New Cybersecurity Requirements for Contractors of All Sizes
The cybersecurity certification process announced by the Department of Defense in January finally takes effect on November 30, 2020. This new certification process, known as the Cybersecurity Maturity Model Certification (CMMC), “provides a methodology for assessing DoD contractor compliance with security requirements as outlined in the National Institute of Standards and Technology (NIST) Special Publication […]
Carmichael Recognized as the North Atlanta Best Business IT Service Provider for Seventh Consecutive Year
ROSWELL, GA – September 17, 2020 – Carmichael Consulting Solutions, a Roswell-based Managed IT Services provider and member of the Apple Consultants Network, announced today that it has been voted Best Business IT Service Provider in North Atlanta for the seventh consecutive year. Carmichael Consulting Solutions has been honored with this award more than any […]
Cyberthieves Have a Laser Focus on Ransomware. Are You in Their Crosshairs?
The Wall Street Journal Pro Cybersecurity Panel Signals New Heads Up Ransomware is on the rise this year, as hackers take advantage of remote work environments, business systems that may not be as well managed as usual, and other conditions common with the ongoing pandemic. So bad has the problem become that ransomware attacks now […]
Phishing Alert! New Email Scam Preys on Internet Users Who Engage in a Very Common Behavior
Have you ever “borrowed” an image off the Internet to use on a website (or post anywhere else)? You are not alone. As early as 2013, the Pew Research Center found that nearly 50% of Internet users download and repost images they find online. Unfortunately, cyberattackers know that too, and they are using this common […]
Are Your IT Staff and External Tech Provider in Sync?
If not, an enhanced, technology-based “trouble-ticket” system might be the answer. If your firm is like most organizations, you have internal IT staff who are responsible for a variety of projects. These may range from provisioning new employees with computer systems to establishing and managing permissions for access to data stores, web apps, and more. […]
WEBINAR: IT Support in the New Normal: Cut Costs, Not Services
If you are reevaluating your budgets and expenses right now, deciding how to proceed with IT support over the remainder of 2020, we can resolve your IT headaches and stretch your dollars further. Listen to our recent webinar, “IT Support in the New Normal: Cut Costs, Not Services” where we explain how we’ve become the IT lifeline for even our largest enterprise customers, equipping them with vital benefits and services.
Technology for Your Company and Its Workers — On-Premise, Virtual Environment or Cloud-as-a-Service?
Cloud adoption has become so ubiquitous that a recent Forbes study projected only 27% of workloads would be on-premise (on-site hardware) by the end of 2020. Yet, many business owners, especially in small and midsized companies, are still uncertain when and how they should fully embrace cloud computing. Some perceive cloud migration as expensive or […]
Small business checklist for securing your remote workforce
The pervasive and continuing impact of COVID-19 on American business cannot be denied. Overnight, every business became a remote business as those sheltering in place used desktops, laptops, tablets and mobile phones to keep working. Remote workers now need to access small business’ sensitive customer information from anywhere, and that keeps many business owners up […]
WEBINAR: Work Securely From Anywhere
Watch this timely webinar where experts explain the enhanced security available via three proven approaches to secure communication: cloud-based applications, virtual private networks (VPNs) and IP phone systems.