Blog
  • Register

Subscribe to our blog

CTN Blog

CTN Solutions has been serving the greater Philadelphia area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Companies Need to Keep a Vendor's Security in Mind

Companies Need to Keep a Vendor's Security in Mind

Data breaches have a tendency to destabilize relationships. With so many data-related problems befalling businesses, it is important that each side of every data-driven relationship understands their role in the protection of another organization's data. Today, we’ll take a look at the issue and how to determine if your partners are putting in the effort required to keep your data secure. 

0 Comments
0 Comments
Continue reading

Your Guide to the Modern Varieties of Cybercriminal

Your Guide to the Modern Varieties of Cybercriminal

There is an entire litany of stereotypes that are commonly linked to the term “hacker," too many for us to dig into here, especially since they are only a caricature of cybercriminals today. Let’s go into the different varieties that are covered under the blanket term of “hacker,” and the threat that each poses to businesses today.

0 Comments
0 Comments
Continue reading

Phishing is a Huge Risk to Your Business

Phishing is a Huge Risk to Your Business

Of all the cybersecurity considerations a modern business has to make, defense against phishing has to be at the top of any cybersecurity strategy. Let’s take a look at phishing and why it’s such a big problem for your business. 

0 Comments
0 Comments
Continue reading

A Checklist for Your BYOD Policy

A Checklist for Your BYOD Policy

One of the most effective ways for a business to shave a few dollars off its budget (and potentially boost employee engagement) is to adopt a Bring Your Own Device policy. It is an agreement that allows their team members to access business-owned documents and files on devices they personally own, to get their work done. While these policies have been shown to be very effective, they also need to be carefully considered so they can be adopted appropriately.

0 Comments
0 Comments
Continue reading

CTN Presents a Webinar on Cybersecurity

CTN-Social-Invite

CTN presents a webinar on cybersecurity and how cyber insurance can help your business.

Do you have a cyber policy today? Is it relevant based on your current business needs? Will it actually work in response to a cyber event? Join us March 31st at 11:00am EST to hear how a standalone cyber policy can help you survive a cyberattack or data breach.

0 Comments
0 Comments
Continue reading

Accounting Firms are Finding Their IT Overtaxed

Accounting Firms are Finding Their IT Overtaxed

With tax season quickly reaching its crescendo, accountants and CPAs face increased threats to their data security. Your clients' financial information is too good for a cybercriminal to pass up. Now is the time to prepare yourself to fight a cyberattack. Learn how managed IT can support your business in a variety of ways.

0 Comments
0 Comments
Continue reading

Tip of the Week: Highlighting Messages in Outlook

Tip of the Week: Highlighting Messages in Outlook

Like any email platform, Microsoft Outlook can easily become overwhelmed with messages and conversations—effectively making it counterproductive rather than an asset to you and your team. Let’s take a few moments to go over a simple way that you can use Outlook’s internal tools to make your messages easier to deal with.

0 Comments
0 Comments
Continue reading

Three IT Practices that Can Drive Your Success

Three IT Practices that Can Drive Your Success

When looking to improve your business via the use of technology, it helps to keep a few basic tenets in mind. Let’s review some strategies to help reinforce their importance.

0 Comments
0 Comments
Continue reading

Tip of the Week: How to Prepare a Data Breach Response

Tip of the Week: How to Prepare a Data Breach Response

More people depend on technology, therefore more data breaches unfortunately occur. The correlation makes sense, but with so much innovation in data security and data systems, it’s a shame more can’t be done to keep businesses and individuals from losing data to opportunists and scammers. That’s why knowing how to circumvent these forces is essential to keep your data safe. Let’s take a look at how the people that are best at it keep their data secure. 

0 Comments
0 Comments
Continue reading

CTN Solutions Offers IT Staffing

The benefits of using an IT staffing firm to fill an employer’s temporary needs cannot be denied. IT staffing services allow for greater flexibility, lower overhead costs, higher quality and quicker hires, just to name a few. Did you know, however, that our services don’t stop at temporary/contract positions? It’s true. We can also prove to be a truly invaluable partner when looking to fill full-time positions, especially those related to technology.

0 Comments
0 Comments
Continue reading

Tip of the Week: Browser Best Practices for Boosted Security

Tip of the Week: Browser Best Practices for Boosted Security

Privacy is a sensitive subject nowadays, especially online. Regardless of the browser you have elected to use, properly using it will have a large impact. Let’s review a few ways that you and your team can help secure your business and its resources and go over these settings.

0 Comments
0 Comments
Continue reading

Working with Images on the Web, Part 2 - Resizing Images

Working with Images on the Web, Part 2 - Resizing Images

In a recent post, we talked about the various image formats you should use when sharing images over email or online. The goal is to generate an image (or images) that are the smallest file size possible to make them easy to share and quick to download, without reducing the overall quality of the image.

0 Comments
0 Comments
Continue reading

Cybersecurity Risks of LinkedIn and 5 Tips to Stay Safe

Cybersecurity Risks of LinkedIn and 5 Tips to Stay Safe

Social engineering is an often-overlooked method bad actors take in executing cybercrime.  And while one may think Facebook is the go-to social platform for criminals to target individuals, LinkedIn is a far richer treasure trove of data and unsuspecting contacts.  With a respectable 720+ million monthly users, LinkedIn is recognized as the professional social media site; providing tools for businesses or people to develop and share industry thought leadership as well as to attract employees. 

0 Comments
0 Comments
Continue reading

A Strong and Secure Password Policy

CTN recommends a strong password policy. Passwords must meet the complexity requirements outlined below and must not be shared. Each member of your staff should change passwords with these conditions in mind:

0 Comments
0 Comments
Continue reading

CTN Expands its IT Staffing Practice

Did you know that CTN Solutions has a successful, global IT Staffing practice?

The benefits of using an IT staffing firm to fill your temporary needs cannot be denied. Our services allow for greater flexibility, lower overhead costs, higher quality, and quicker hires – just to name a few.

Did you know, however, that our services don’t stop at temporary/contract positions? It’s true. CTN can be a truly invaluable partner when looking to fill full-time positions – especially those related to technology, our focused specialty. Don’t let your full-time positions go unfilled.  There are serious risks in doing so. Instead, contact CTN Solutions, whose specialty lies in finding and qualifying hard to find talent.

Look out for CTN’s February newsletter to dive deeper into the reasons you should call on CTN Solutions for your staffing needs.

0 Comments
0 Comments
Continue reading

How to Prevent a Business Email Compromise Attack

Did you know? Business email compromise is one of the most common threats today. It employs tactics like impersonating an executive, HR, or a trusted vendor to initiate fraudulent transfers of money. According to the FBI, $1.7 billion was lost to BEC in 2019 alone. Here are tips from the FBI to stay secure:

0 Comments
0 Comments
Continue reading

Reconsidering IT Principles Can Help Push Business Forward

Reconsidering IT Principles Can Help Push Business Forward

It isn’t often that you’ll hear a managed service provider say something like, “There’s no school like the old school.” In many ways, however, the basic principles of a solid business IT strategy haven’t changed all that much… despite the momentous changes that we’ve witnessed in terms of the technology we use. Let’s consider some of these principles, and how they’ve changed over time (if at all).

0 Comments
0 Comments
Continue reading

The Cloud Continues Massive Growth

The Cloud Continues Massive Growth

Cloud computing has been one of the most utilized tools for business in 2020. The COVID-19 pandemic has made it crucial for businesses to give remote access to tools and one effective way to make that happen was to look to the cloud. This has expanded an already booming market and presents businesses of all sizes with the opportunity to get the computing they need without huge upfront costs. Today, we’ll take a look at the cloud computing market and how hosted computing solutions can improve your business. 

0 Comments
0 Comments
Continue reading

Here’s What You Need to Know About the Giant SolarWinds Cyberattack

Here’s What You Need to Know About the Giant SolarWinds Cyberattack

2020, unsurprisingly, has decided to go out with a bang, as it has been revealed that the United States was targeted in the largest cyberespionage attack to date. Let’s go over what this attack means, and how things will need to play out in the future.

0 Comments
0 Comments
Continue reading

As we head into 2021...

tech_242419396_400

2020 has not been a normal year - this may be the understatement of all time.

0 Comments
0 Comments
Continue reading

Mobile? Grab this Article!

QR Code

Latest News & Events

CTN does not use any SolarWinds or FireEye products. As you’ve likely seen reported, SolarWinds discovered a supply chain attack compromising their Orion business software updates that distributed malware known as SUNBURST. The malware perm...

Latest Blog

Data breaches have a tendency to destabilize relationships. With so many data-related problems befalling businesses, it is important that each side of every data-driven relationship understands their role in the protection of another organi...

Contact Us

Learn more about what CTN can do for your business.

Call us today
(610) 828-5500

610 Sentry Parkway
Suite 110
Blue Bell, Pennsylvania 19422