Blog
  • Register

Subscribe to our blog

CTN Blog

CTN Solutions has been serving the greater Philadelphia area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

CTN Solutions Offers IT Staffing

The benefits of using an IT staffing firm to fill an employer’s temporary needs cannot be denied. IT staffing services allow for greater flexibility, lower overhead costs, higher quality and quicker hires, just to name a few. Did you know, however, that our services don’t stop at temporary/contract positions? It’s true. We can also prove to be a truly invaluable partner when looking to fill full-time positions, especially those related to technology.

0 Comments
0 Comments
Continue reading

Tip of the Week: Browser Best Practices for Boosted Security

Tip of the Week: Browser Best Practices for Boosted Security

Privacy is a sensitive subject nowadays, especially online. Regardless of the browser you have elected to use, properly using it will have a large impact. Let’s review a few ways that you and your team can help secure your business and its resources and go over these settings.

0 Comments
0 Comments
Continue reading

Working with Images on the Web, Part 2 - Resizing Images

Working with Images on the Web, Part 2 - Resizing Images

In a recent post, we talked about the various image formats you should use when sharing images over email or online. The goal is to generate an image (or images) that are the smallest file size possible to make them easy to share and quick to download, without reducing the overall quality of the image.

0 Comments
0 Comments
Continue reading

Cybersecurity Risks of LinkedIn and 5 Tips to Stay Safe

Cybersecurity Risks of LinkedIn and 5 Tips to Stay Safe

Social engineering is an often-overlooked method bad actors take in executing cybercrime.  And while one may think Facebook is the go-to social platform for criminals to target individuals, LinkedIn is a far richer treasure trove of data and unsuspecting contacts.  With a respectable 720+ million monthly users, LinkedIn is recognized as the professional social media site; providing tools for businesses or people to develop and share industry thought leadership as well as to attract employees. 

0 Comments
0 Comments
Continue reading

A Strong and Secure Password Policy

CTN recommends a strong password policy. Passwords must meet the complexity requirements outlined below and must not be shared. Each member of your staff should change passwords with these conditions in mind:

0 Comments
0 Comments
Continue reading

CTN Expands its IT Staffing Practice

Did you know that CTN Solutions has a successful, global IT Staffing practice?

The benefits of using an IT staffing firm to fill your temporary needs cannot be denied. Our services allow for greater flexibility, lower overhead costs, higher quality, and quicker hires – just to name a few.

Did you know, however, that our services don’t stop at temporary/contract positions? It’s true. CTN can be a truly invaluable partner when looking to fill full-time positions – especially those related to technology, our focused specialty. Don’t let your full-time positions go unfilled.  There are serious risks in doing so. Instead, contact CTN Solutions, whose specialty lies in finding and qualifying hard to find talent.

Look out for CTN’s February newsletter to dive deeper into the reasons you should call on CTN Solutions for your staffing needs.

0 Comments
0 Comments
Continue reading

How to Prevent a Business Email Compromise Attack

Did you know? Business email compromise is one of the most common threats today. It employs tactics like impersonating an executive, HR, or a trusted vendor to initiate fraudulent transfers of money. According to the FBI, $1.7 billion was lost to BEC in 2019 alone. Here are tips from the FBI to stay secure:

0 Comments
0 Comments
Continue reading

Reconsidering IT Principles Can Help Push Business Forward

Reconsidering IT Principles Can Help Push Business Forward

It isn’t often that you’ll hear a managed service provider say something like, “There’s no school like the old school.” In many ways, however, the basic principles of a solid business IT strategy haven’t changed all that much… despite the momentous changes that we’ve witnessed in terms of the technology we use. Let’s consider some of these principles, and how they’ve changed over time (if at all).

0 Comments
0 Comments
Continue reading

The Cloud Continues Massive Growth

The Cloud Continues Massive Growth

Cloud computing has been one of the most utilized tools for business in 2020. The COVID-19 pandemic has made it crucial for businesses to give remote access to tools and one effective way to make that happen was to look to the cloud. This has expanded an already booming market and presents businesses of all sizes with the opportunity to get the computing they need without huge upfront costs. Today, we’ll take a look at the cloud computing market and how hosted computing solutions can improve your business. 

0 Comments
0 Comments
Continue reading

Here’s What You Need to Know About the Giant SolarWinds Cyberattack

Here’s What You Need to Know About the Giant SolarWinds Cyberattack

2020, unsurprisingly, has decided to go out with a bang, as it has been revealed that the United States was targeted in the largest cyberespionage attack to date. Let’s go over what this attack means, and how things will need to play out in the future.

0 Comments
0 Comments
Continue reading

As we head into 2021...

tech_242419396_400

2020 has not been a normal year - this may be the understatement of all time.

0 Comments
0 Comments
Continue reading

Holding Your Own Against Today's Most Pressing Threats

Holding Your Own Against Today's Most Pressing Threats

For all the attention that we (and many others) give to cybercrime, people are still falling victim to hacks and scams every day. With most businesses operating more in the digital sphere than ever before, it stands to reason that they need to do more to keep from being a victim of a data breach or worse. Here are six things your business should do to keep from being a victim of a cyberattack.

0 Comments
0 Comments
Continue reading

Managed IT Can Help You Manage Your Technology Inventory

Managed IT Can Help You Manage Your Technology Inventory

When was your critical business technology last updated? When do your software licenses expire? When did your printer last have any maintenance performed on it?

0 Comments
0 Comments
Continue reading

Five Cool Technologies You Can Give for Secret Santa

Five Cool Technologies You Can Give for Secret Santa

The strangest year in our lives is coming to a close and the holidays figure to be just as strange. With the COVID-19 pandemic still roaring away, there probably won’t be a lot of the events that are typical this time of year. That doesn’t have to ruin the time of year, however. Today, we thought that we would take a look at five cool tech gadgets and services that won’t break the bank, but will also be a cool addition under the tree or for your secret santa. 

0 Comments
0 Comments
Continue reading

Cybersecurity Risk Management and the Need for Small Businesses to have Cyber Insurance

Security-_-Fotolia_126365637_S_400

More than 70 percent of cyberattacks target businesses with less than 100 employees, and a recent report said that 60 percent of small businesses affected by ransomware went bankrupt within six months. Couple this information with information from Cybersecurity Ventures stating that, heading into 2021, businesses will suffer a ransomware attack every 11 seconds and cyberattacks will cost $6 trillion annually, and the FBI reports that digital crime increased 75% between March and June of 2020. These numbers are quite staggering, especially as many small businesses have undergone sudden transformations into remote work environments necessitated by COVID-19, however, most are not equipped to manage the security, risk, and technology demands that arise with work-from-home employees.

0 Comments
0 Comments
Continue reading

A Field Guide to Phishing Attacks

A Field Guide to Phishing Attacks

Despite the name being mildly amusing, phishing attacks are no laughing matter. These scams, in all their different forms, wreak havoc on businesses—ranking as the top breach threat in the 2020 edition of Verizon’s annual Data Breach Investigations Report, and successfully impacting 65 percent of United States organizations in 2019 as reported by Proofpoint’s 2020 State of the Phish Report. Avoiding them requires you to be able to spot them, so let’s go over the different varieties of phishing that can be encountered.

0 Comments
0 Comments
Continue reading

Social Media Is A Tool For Any Business

Social Media Is A Tool For Any Business

Social media companies have a lot of power and influence, which is part of the reason that so many of today’s largest businesses have adopted social media as a critical promotional tool. With the average person spending about two hours and 24 minutes on social media and messaging applications per day, this makes social media a clear opportunity for any sized business to embrace. Let’s consider a few ways this can be accomplished for these different businesses.

0 Comments
0 Comments
Continue reading

What Exactly is Software-as-a-Service?

What Exactly is Software-as-a-Service?

Businesses have many problems they need to solve. With technology, the process typically starts with identifying a problem, researching solutions, and finding one that will successfully work to solve the problem. Traditionally, when dealing with technology, a company would procure the hardware and hire technicians to implement the solution and deploy the services needed. If they had to borrow money to do it, they would because the profits would presumably be more than the payments even with banks tacking on interest. 

0 Comments
0 Comments
Continue reading

Is Security Being Sacrificed for the Sake of Convenience?

Is Security Being Sacrificed for the Sake of Convenience?

While this time of year is always huge for online retail, there is likely to be a much larger number of people turning to the Internet for their holiday purchases than usual… and, it would seem, a larger number of people taking security into consideration as they do so. Let’s examine how consumers are taking their data into their own hands and what this means for your business.

0 Comments
0 Comments
Continue reading

A Look at Modern Networking

A Look at Modern Networking

There are times when people take their technology for granted. One of the most under-the-radar, yet still critical parts of a business technology infrastructure is the networking equipment. By this we mean the hardware that connects your business to the Internet and to your network. We are talking cables, switches, and routers. This month, we will take a look at typical office networking found in 2020 and the technologies that are primed to replace them. 

0 Comments
0 Comments
Continue reading

Mobile? Grab this Article!

QR Code

Latest News & Events

CTN does not use any SolarWinds or FireEye products. As you’ve likely seen reported, SolarWinds discovered a supply chain attack compromising their Orion business software updates that distributed malware known as SUNBURST. The malware perm...

Latest Blog

The benefits of using an IT staffing firm to fill an employer’s temporary needs cannot be denied. IT staffing services allow for greater flexibility, lower overhead costs, higher quality and quicker hires, just to name a few. Did ...

Contact Us

Learn more about what CTN can do for your business.

Call us today
(610) 828-5500

610 Sentry Parkway
Suite 110
Blue Bell, Pennsylvania 19422