Could Your Legacy Antivirus Software Be Exposing Your Systems?

Legacy Antivirus

Antivirus Software Blocks Viruses, but Could It Also Be Exposing Your Systems to Intrusion?   Antivirus software has become such a necessity in the modern era of cyber threats that more than 89%1 of desktop users rely upon it and 80%2 of laptop users have it installed, as well. This comes as no surprise, given […]

The ABCs of Mobile Device Management

Mobile Device Management

The ABCs of Mobile Device Management – Always Be Cautious Given the importance of cellphones — and in particular, smartphones — in both our work and personal lives, these devices can formally be considered ubiquitous. (In the U.S., 82.21 percent of the population was using a smartphone as of 2021.) Unfortunately, their popularity makes them […]

Mid-Year Email Security Report: It’s Still a Major Threat

Advanced Email Security to Prevent Phishing

Mid-Year Email Security Report: It’s Still a Huge Problem and a Major Threat Despite the vast amount of publicity that dangers such as phishing, spam and business email compromise have received, the hard truth is that business workers (and everyone else) are still falling for these tricks. Most people know that many cyberattacks are transmitted […]

The Future of Backup and Disaster Recovery: What You Need to Know

Incremental Backup

If current trends continue, global disasters will rise from 389 in 2020 to an estimated 560 yearly by 2030. That’s without considering business-specific disasters, such as Internet attacks (35.2 million in 2021), data loss and other common problems. As company leaders face these events with no end in sight, it’s clear they must have a failproof backup […]

An Old Friend Is Leaving Us On June 15, 2022

IE 11 End of Life

The word friend might be a bit strong, but… Over the past year, you may have noticed that Microsoft has been making Internet Explorer (IE) “end of support” announcements. This is all part of its plan to sunset that product and transition its customers to Microsoft Edge. At Carmichael Consulting Solutions, we have been following […]

Dealing with Risk: Does Your Firm’s Strategy Align with Your Business Realities?

Risk Management Strategy

All business decision makers must deal with risk at some level, whether it’s market risk, cybersecurity risk or financial risk. For all of these (and other) risks, proactively making a choice is far better — and safer — than leaving things to chance. In the technology arena, this is especially true. Two decades ago, most […]

The State of Managed IT in 2022: Strategy and Vision Lead the Way

Expert Managed Services Provider

For the past 24 months, Managed IT Services has been one of the fastest growing revenue engines of the technology industry, as organization leaders recognized the value of outsourcing their IT services to seasoned experts. Per a survey by the Technology & Services Industry Association (TSIA), Managed Services in 2021 grew at 20%, year over […]

If a Disaster Disrupted Your Business Tomorrow, Would You Be Prepared?

Business Continuity Metro Atlanta

Achieving Business Continuity In the past few decades, the definition of “business disaster” has changed substantially. Now, the greatest threat most companies face isn’t a tornado or other natural disaster but rather a technology-based threat such as a cyberattack. However, recent weather has proven that natural disasters are still present and must be considered in […]

Email Is Global — and Globally Dangerous. Simulation Exercises Help Keep Your Firm Safe.

Email Phishing Simulations

With an estimated 319 billion emails sent around the world in 20211, email continues to be a predominant means of both casual and professional communications. This is no surprise, because email is inexpensive and transmission is fast. Messages, travelling on global Internet connections, can take seconds to arrive at their destinations. Unfortunately, this convenience comes […]

Phishing – Don’t Be Caught in Criminals’ Nets

Phishing — Don’t Be Caught in Criminals’ Nets!  Phishing, a cybercrime that combines social engineering (tricking unwitting computer or mobile users into exposing themselves to an attack) with technology-based deception to steal sensitive personal and financial information, is on a meteoric rise. Email has always been a primary attack vehicle, and the situation is getting […]