Cybersecurity: Are Cell Phones Safe?

Vulnerabilities in the mobile phone infrastructure threaten not only personal privacy and security, but your company’s as well. The cellular communication system is the heart of modern communication, but are we doing enough to protect ourselves against cybersecurity threats. Cyber Security to most people seems like a foreign concept or that it won’t affect you.… Read more »

Abacus Technologies

Abacus Technologies: New Name & Look for 2019

Abacus IT Solutions is now Abacus Technologies. Our new name better reflects the company’s growth and focus. While the number and types of technology continue to increase our mission remains the same, to provide peace of mind for our clients. So they can focus on their business and not the technology required to run it.… Read more »

Chainlink with a paperclip holding it together.

Phishing: Strengthening your Weakest Link

Phishing is no longer a technique of attack reserved for the sophisticated attacker.  It is common to receive two, maybe three a day tempting you to reset your password at Amazon, pay the parking ticket you never received, or even access a file that was shared out to you from someone you know. As a… Read more »

Man holding up hand

Cyber Attacks | What You Need to Know

Right now as you read this article there are well-organized cybercriminals developing plans to cyber attack small businesses like yours to steal your data, encrypt your systems, and trick you into sending them money. More than half of cyber attacks are aimed at small businesses and 1 in 5 have become victims. Small Businesses can… Read more »

Logo

Come See Us in State-Wide Cybersecurity Roadshow

Abacus IT Solutions is participating in a Panel Discussion Roadshow focused on Cybersecurity October 23-34 in Mobile, Montgomery, Birmingham and Huntsville. It will be sponsored by PNC Bank and Women in Public Finance. The event is for Women who currently work in Public Finance for state and local governments, not-for-profit, investment bankers, attorneys, financial advisors,… Read more »

Abacus IT Logo

Why Should My Business Outsource IT?

Being competitive in today’s market is directly influenced by how time and cost-efficient businesses can be. With technology evolving more every day, there are always opportunities to change processes and utilize technology to assist or fully automate time-consuming tasks to become for efficient. One way to do that is to outsource IT. There are more… Read more »

STC logo

Abacus Technologies Becomes STOP. THINK. CONNECT.™ Partner

Abacus Technologies today announced that it has signed on as a partner of STOP. THINK. CONNECT. ™, the global online safety awareness, and education campaign. Securing the internet is a responsibility we all share, and STOP. THINK. CONNECT. ™ is simple, actionable advice that everyone can follow to be safer and more secure online. “Our partners in business,… Read more »

info graphic of disasters

Planning Your Business for Disaster

In the past month, we have seen a natural disaster destroy businesses, homes, and lives, and have discovered that millions of Americans’ personal information were stolen in an Equifax data breach, along with countless other disasters impacting small businesses around the world. It’s hard to believe such catastrophic events could ever happen to ME, but the reality is, it’s possible.… Read more »

Beating the HEAT and Malicious Attacks 

With so many things in the cloud, do you even need a firewall to prevent attacks? Here are a few reasons why a firewall will always be necessary: Protects your internal network from inbound attacks (malware, port scans, brute force attacks) Controls what traffic can get out prevents sensitive data loss (when configured appropriately) Provides a… Read more »

Cloud image between two hands

Get Your Head in the Cloud

What you and your company need to know about the cloud. Almost 75% of business organizations are already in a public cloud in some way SaaS. This number will continue to grow as more companies are seeing the overall benefits of the cloud environment. It not only allows you to access information from any device… Read more »