Phishing hook

Protection Against Phishing Attacks

As compliance and consumer privacy laws get more robust, businesses need to become more aware of how to equip their employees with the knowledge of what a phishing email looks like and what not to do if they receive one.   Phishing remains a profitable tactic for cybercriminal organizations. The ability to gain access to… Read more »

Password text

How Weak are Your Passwords?

Recent reports from Ponemon’s 2019 State of Passwords and Authentication Security Behaviors have shown companies poor password management habits are making a hacker’s job much easier. According to the report, 51% of users reuse the same password across accounts, and 69% of users admit to sharing passwords with their colleagues in the workplace. It was… Read more »

abacus technologies

New Security Awareness & Training Program

Did you know that 90% of security attacks start with a phishing email? These emails could cost your company thousands of dollars each year. However, there is a solution to help you to avoid these types of attacks. We are proud to announce that we have a new addition to our Security and Compliance Services. Abacus Technologies… Read more »

Cybersecurity Recap

Thank you for following along this month as we talk about Cybersecurity. We want to be able to provide your company with the best knowledge and technologies to protect you against any attacks that might try to comprise your business. We hope that you have found these articles helpful and informative. We covered several hot… Read more »

Rocker Dude

WatchGuard & Abacus Technologies

When companies need proven network security solutions, they turn to WatchGuard with their firewall, VPN, data prevention, and web security services. Scalable to any business size, Abacus Technologies uses WatchGuard products and services to deliver affordable, powerful, and reliable security and performance. WatchGuard provides best in class products and services across the globe. Having in… Read more »

Cyber Security words

What is Cybersecurity?

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. The attacks are usually targeted at accessing, changing, destroying sensitive information, extorting money, or interrupting normal business processes. Implementing effective cybersecurity measures can be challenging because attackers becoming more innovative each year. Abacus Technologies knows that this issue can seem complicated or… Read more »

Email Security

What You Need to Know About Email Security.

There are a variety of email-based attacks that you should be aware of to protect your company against. Hackers are using the full range of techniques to comprise your email security including: phishing, spear-phishing, whaling, business email compromise (BEC), CEO/CFO scamming, and employee impersonation. Most companies have few technical barriers to guard against these types… Read more »

Cybersecurity: Are Cell Phones Safe?

Vulnerabilities in the mobile phone infrastructure threaten not only personal privacy and security, but your company’s as well. The cellular communication system is the heart of modern communication, but are we doing enough to protect ourselves against cybersecurity threats. Cybersecurity to most people can seem like a foreign concept, or  you think that it won’t… Read more »

Abacus Technologies

Abacus Technologies: New Name & Look for 2019

Abacus IT Solutions is now Abacus Technologies. Our new name better reflects the company’s growth and focus. While the number and types of technology continue to increase our mission remains the same. We want to provide peace of mind for our clients. So. they can focus on their business and not the technology required to… Read more »

Chainlink with a paperclip holding it together.

Phishing: Strengthening your Weakest Link

Phishing is no longer a technique of attack reserved for the sophisticated attacker.  It is common to receive two, maybe three a day tempting you to reset your password at Amazon, pay the parking ticket you never received, or even access a file that was shared out to you from someone you know. As a… Read more »