Blog
  • Register

Subscribe to our blog

CTN Blog

CTN Solutions has been serving the greater Philadelphia area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Shouldn’t Slow Your Cybersecurity Spending

You Shouldn’t Slow Your Cybersecurity Spending

COVID-19 has changed the way that most business owners look at a dollar. For months, businesses have been making strategic budget cuts to try to stay afloat. Cybersecurity has been the ultimate growth industry over the past several years, but in the face of the pandemic, the market for these products and services is seeing substantial retraction. In fact, Gartner estimates that in 2020, the cybersecurity industry will shrink by almost $7 billion. Today, we’ll take a look at the cybersecurity market and why it is important not to slow your cybersecurity spending, if you can help it.

0 Comments
0 Comments
Continue reading

FBI Warns About Banking Scams

FBI Warns About Banking Scams

In response to the coronavirus pandemic, many people are avoiding human contact by turning to the Internet and mobile apps. On a national scale, mobile banking alone has seen an increase of 50 percent over just the last few months. In what certainly is no coincidence, the Federal Bureau of Investigation recently put out a warning that identified banking apps as likely targets for hackers.

0 Comments
0 Comments
Continue reading

Train Your Staff to Protect Your Business

Train Your Staff to Protect Your Business

In the course of doing business, sometimes the mundane and repetitive tasks, or the responsibilities that employees don’t necessarily always consider to be part of their jobs, can be overlooked. Like all others, your business needs people to be vigilant to ensure that it isn’t the victim of a phishing attack. If your team isn’t well-trained, or if it isn’t engaged in the fight against cybercrime, you may find that your business is a sitting duck.

0 Comments
0 Comments
Continue reading

Alert: Hackers Target Mobile Banking Apps, Warns FBI

Alert: Hackers Target Mobile Banking Apps, Warns FBI

More people than ever are utilizing the conveniences of the Internet and mobile apps to avoid unnecessary human contact during the coronavirus pandemic. In fact, mobile banking alone has increased by 50 percent over the last few months, nationwide. In a recent PSA, the FBI warned that hackers are likely to be targeting mobile banking apps.

0 Comments
0 Comments
Continue reading

Not All Threats are External

Not All Threats are External

As much as a business relies on its technology, it relies just as much upon its employees to properly put that technology to use. Unfortunately, this can very easily expose the business to various threats that involve their employees. Understanding these insider threats is crucial for a business, especially given how current events may tempt those who would never have considered them otherwise.

0 Comments
0 Comments
Continue reading

Is Your Staff Holding Up Their End on Security?

Is Your Staff Holding Up Their End on Security?

It seems as though every business is depending more and more on their IT. This means that their employees have more exposure to their IT systems. Unfortunately, that relationship is where the majority of the problems reside. A business with a strong security policy has the solutions in place to keep direct infiltration from happening. Hackers have to find another way.

0 Comments
0 Comments
Continue reading

2-Factor, 2-Furious - How 2FA is Our Last Hope

2-Factor, 2-Furious - How 2FA is Our Last Hope

Two-factor Authentication, also referred to as Multi-Factor Authentication, or 2FA, is typically where you log in to something and have to type in a small code from your mobile device in order to finish the sign-in process. It’s really the only thing protecting your accounts anymore, so it’s critical to use it.

0 Comments
0 Comments
Continue reading

Let’s Go Through Some Security Best Practices

Let’s Go Through Some Security Best Practices

While there is no question that security is important to any business, there is often a disconnect between this principle and any actual implementations that it reflects. Unfortunately, this can often leave a business vulnerable. To prevent this outcome, it is important that you follow a few best practices when it comes to fortifying your business against attack.

0 Comments
0 Comments
Continue reading

Data Security is Essential

Data Security is Essential

Today, the threats businesses encounter from the Internet are more frequent and dangerous than any previous threats. To avoid being the victim of a cyberattack, you will need strategies and procedures aimed at mitigating them. Let’s look at some strategies you need to consider if you are to keep the threats off your network. 

0 Comments
0 Comments
Continue reading

We Need to Flatten the Curve of Cybersecurity Risk

We Need to Flatten the Curve of Cybersecurity Risk

People have been examining the COVID-19 pandemic and the resulting economic and social shutdown from every angle. Unfortunately, some of those people took it as the opportunity they’ve been waiting for to try and steal data and, in some cases, money from unprotected and unprepared people and businesses online. Let’s examine how the events surrounding COVID-19 have had an effect on cybercrime.

0 Comments
0 Comments
Continue reading

Tip of the Week: Best Practices to Protect Your Business

Tip of the Week: Best Practices to Protect Your Business

As a business leader, you must be aware of all different varieties of cybercrime. However, most of these varieties can largely be avoided through a few basic practices and behaviors. Here, we’re giving you a few tips to help you prevent attacks from successfully influencing your business, so make sure you share them with your entire team, as well.

0 Comments
0 Comments
Continue reading

Don’t Get Phished Out of Your Stimulus Payment

Don’t Get Phished Out of Your Stimulus Payment

Wherever there is money, there are scammers. So it may not be a big surprise that scammers are out en masse, trying to get between you and your federally mandated stimulus money.  It’s bad enough that we’ve already seen phishing scams using the COVID-19 pandemic, designed to help hackers get into accounts they do not own. Now that these scammers know people are getting cash, the scams are kicked up a notch.

0 Comments
0 Comments
Continue reading

Tip of the Week: Making Sure Your Workstation is Sanitized

Tip of the Week: Making Sure Your Workstation is Sanitized

We spend a lot of time on this blog talking about virus avoidance, but today we will go into things you can do to keep another type of virus--specifically COVID-19--away from you and your technology.

0 Comments
0 Comments
Continue reading

Protect Your Laptop from Theft

Protect Your Laptop from Theft

We talk about cybersecurity often. We talk about protecting your data from the illusive threat that hackers and cybercriminals bring. We don’t often talk about the more obvious type of security - preventing the physical theft of your data. It’s time!

0 Comments
0 Comments
Continue reading

Working from Home Isn’t Without Significant Cybersecurity Risks

Working from Home Isn’t Without Significant Cybersecurity Risks

The COVID-19 pandemic has greatly disrupted daily life, restricting people to their homes and preventing them from going into the office to work. In response, many companies are hurriedly changing over to a remote-capable workforce and having their employees work from home. This strategy can be highly effective, but if a company and its team are not careful, it can also be risky.

0 Comments
0 Comments
Continue reading

What You Need to Know to Manage a Remote Workforce

What You Need to Know to Manage a Remote Workforce

There are many reasons that your team may want (or need) to work from home, and there are many reasons to allow them to do so. A 2019 survey by OwlLabs indicated that 71 percent of remote workers are happy with their job (as compared to 55 percent of on-site workers); remote workers responded that they are 13   percent more likely than onsite workers to stay in their current job for five more years than onsite workers will; and when respondents claimed to be working longer than 40 hours per week, onsite workers were doing so out of necessity, while remote workers did so out of desire and enjoyment.

0 Comments
0 Comments
Continue reading

The Employee’s Guide to Working Remotely

The Employee’s Guide to Working Remotely

It’s not uncommon where a situation arises and you will find yourself working from home. To make this work, it is important that you keep a few additional issues in mind so that you can make the most of it. We have put together a few simple best practices that you should keep in mind as you operate remotely.

0 Comments
0 Comments
Continue reading

Biometrics Has a Privacy Problem

Biometrics Has a Privacy Problem

The inclusion of biometric security systems have been all the rage in a range of organizations, due, in large part, because of the thought that other security platforms aren’t nearly as secure. Unfortunately, the superior security they are expecting may not be able to meet their expectations. Today, we will discuss biometric security, where it fits, and how it can be problematic for the small business. 

0 Comments
0 Comments
Continue reading

How to Create Cybersecurity Policies for Your Company

How to Create Cybersecurity Policies for Your Company

If you’re in business today, there are three words that are critical for you keep in mind: Cybersecurity. Is. Important. As such, every business needs to take the time to put together a cybersecurity policy--a set of guidelines that instruct the business how to proceed with the highest level of security possible. We’ve taken the liberty of suggesting a few guidelines for your business to follow as you do so.

0 Comments
0 Comments
Continue reading

Are Your Biggest Threats Coming From Inside Your Company?

Are Your Biggest Threats Coming From Inside Your Company?

Most businesses that lean on their IT go to great lengths and expense to keep those systems secure. Sometimes, however, all those firewalls and antivirus software don’t stop threats that come in from your staff. Today, we are going to go through the three different types of human error that your staff can undertake, and how to deal with each.

0 Comments
0 Comments
Continue reading

Mobile? Grab this Article!

QR Code

Latest News & Events

CTN has been named to the 2020 Managed Services (MSP) 500 list of accomplished IT providers in North America by CRN and The Channel Company. This popular list identifies North American solution providers that deliver operational efficiencie...

Latest Blog

COVID-19 has changed the way that most business owners look at a dollar. For months, businesses have been making strategic budget cuts to try to stay afloat. Cybersecurity has been the ultimate growth industry over the past several years, b...

Contact Us

Learn more about what CTN can do for your business.

Call us today
(610) 828-5500

610 Sentry Parkway
Suite 110
Blue Bell, Pennsylvania 19422