Blog
  • Register

Subscribe to our blog

CTN Blog

CTN Solutions has been serving the greater Philadelphia area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cybersecurity Risks of LinkedIn and 5 Tips to Stay Safe

Cybersecurity Risks of LinkedIn and 5 Tips to Stay Safe

Social engineering is an often-overlooked method bad actors take in executing cybercrime.  And while one may think Facebook is the go-to social platform for criminals to target individuals, LinkedIn is a far richer treasure trove of data and unsuspecting contacts.  With a respectable 720+ million monthly users, LinkedIn is recognized as the professional social media site; providing tools for businesses or people to develop and share industry thought leadership as well as to attract employees. 

0 Comments
0 Comments
Continue reading

A Strong and Secure Password Policy

CTN recommends a strong password policy. Passwords must meet the complexity requirements outlined below and must not be shared. Each member of your staff should change passwords with these conditions in mind:

0 Comments
0 Comments
Continue reading

CTN Expands its IT Staffing Practice

Did you know that CTN Solutions has a successful, global IT Staffing practice?

The benefits of using an IT staffing firm to fill your temporary needs cannot be denied. Our services allow for greater flexibility, lower overhead costs, higher quality, and quicker hires – just to name a few.

Did you know, however, that our services don’t stop at temporary/contract positions? It’s true. CTN can be a truly invaluable partner when looking to fill full-time positions – especially those related to technology, our focused specialty. Don’t let your full-time positions go unfilled.  There are serious risks in doing so. Instead, contact CTN Solutions, whose specialty lies in finding and qualifying hard to find talent.

Look out for CTN’s February newsletter to dive deeper into the reasons you should call on CTN Solutions for your staffing needs.

0 Comments
0 Comments
Continue reading

How to Prevent a Business Email Compromise Attack

Did you know? Business email compromise is one of the most common threats today. It employs tactics like impersonating an executive, HR, or a trusted vendor to initiate fraudulent transfers of money. According to the FBI, $1.7 billion was lost to BEC in 2019 alone. Here are tips from the FBI to stay secure:

0 Comments
0 Comments
Continue reading

Reconsidering IT Principles Can Help Push Business Forward

Reconsidering IT Principles Can Help Push Business Forward

It isn’t often that you’ll hear a managed service provider say something like, “There’s no school like the old school.” In many ways, however, the basic principles of a solid business IT strategy haven’t changed all that much… despite the momentous changes that we’ve witnessed in terms of the technology we use. Let’s consider some of these principles, and how they’ve changed over time (if at all).

0 Comments
0 Comments
Continue reading

By accepting you will be accessing a service provided by a third-party external to https://www.ctnsolutions.com/

Mobile? Grab this Article!

QR Code

Latest News & Events

CTN does not use any SolarWinds or FireEye products. As you’ve likely seen reported, SolarWinds discovered a supply chain attack compromising their Orion business software updates that distributed malware known as SUNBURST. The malware perm...

Latest Blog

Of all the cybersecurity considerations a modern business has to make, defense against phishing has to be at the top of any cybersecurity strategy. Let’s take a look at phishing and why it’s such a big problem for your business. ...

Contact Us

Learn more about what CTN can do for your business.

Call us today
(610) 828-5500

610 Sentry Parkway
Suite 110
Blue Bell, Pennsylvania 19422