• Home
  • Solutions
    • Managed IT Services
    • Cybersecurity Solutions
    • Data Backup & Recovery
    • Cloud IT Services
    • Support & Maintenance
    • Infrastructure Management
    • VoIP Phone Services
    • Custom Solutions
  • Resources
    • Tech Guides
    • Blog & News
  • Careers
  • Support
  • Get in Touch

Cybersecurity threats are on the rise. Your business is at risk. | Download the Network Security Checklist

Midnight Blue logo
  • Home
  • Solutions
    • Managed IT Services
    • Cybersecurity Solutions
    • Data Backup & Recovery
    • Cloud IT Services
    • Support & Maintenance
    • Infrastructure Management
    • VoIP Phone Services
    • Custom Solutions
  • Resources
    • Tech Guides
    • Blog & News
  • Careers
  • Support
  • Get in Touch

Blog & News

All Categories

All Categories Best Practices Blog Posts Business Case Study Cloud Events MBTS Team Network Security News Security Tech Tips Technology Telephony Uncategorized

4 Resolutions to Keep Your Business Secure in 2018

01/22/2018

With every new year comes great new opportunities, and 2018 is no different. However, change can be a good thing, and with a new year also comes more perspective and knowledge that you can use to make considerable improvements to the way you run your organization. Here are four ways that you can use developments […]

Read More...

2018 is Expected to See $96 Billion in IT Security Investments

01/19/2018

If you were considering increasing your investment into your information security in 2018, you certainly aren’t alone. Gartner released a report that indicated a considerable rise in plans to invest in key security considerations. Closer analysis of these considerations shows that businesses around the world are paying attention to essential security requirements that have seen […]

Read More...

Update on the Meltdown / Spectre Threat

01/18/2018

Recently, security researchers at Google uncovered a pair of security exploits that could allow an unauthorized third party to access chip memory, which holds sensitive information like passwords and cached files. The two vulnerabilities – referred to as Meltdown and Spectre – put almost all computers, laptops, servers and smartphones utilizing chips made by Intel […]

Read More...

20-Year-Old Exploit Finds New Life as ROBOT

01/15/2018

There is no shortage of threats on the Internet, from situational issues to deliberate attacks meant to damage your company or steal your valuable data. While new threats pop up almost every day, some have been around for some time–so long, that many seem to not consider them as viable threats. This can be seen […]

Read More...

Scam Leverages Email from a Reluctant Contract Killer

01/08/2018

To many, email scams have become a joke. Sitcoms have throwaway punchlines that reference a character getting an email from a rich uncle in Nigeria, or some friend needing funds to get home from an overseas trip. One of these scams may not at first seem to be amusing, as it threatens the recipient’s life, […]

Read More...

1 … 60 61 62 … 102
Midnight Blue logo

Sign Up For Newsletter

Navigate

  • Solutions
  • Company
  • Blog
  • Pittsburgh

Interact

  • Support
  • Pay My Bill
  • Contact

Get Social

  • Facebook
  • Twitter
  • Linkedin

1195 Washington Pike #340, Bridgeville, PA 15017
Midnight Blue Technology Services, LP
412.342.3800

  • Privacy Policy
  • Sitemap