• Home
  • Solutions
    • Managed IT Services
    • Cybersecurity Solutions
    • Data Backup & Recovery
    • Cloud IT Services
    • Support & Maintenance
    • Infrastructure Management
    • VoIP Phone Services
    • Custom Solutions
  • Resources
    • Tech Guides
    • Blog & News
  • Careers
  • Support
  • Get in Touch

Cybersecurity threats are on the rise. Your business is at risk. | Download the Network Security Checklist

Midnight Blue logo
  • Home
  • Solutions
    • Managed IT Services
    • Cybersecurity Solutions
    • Data Backup & Recovery
    • Cloud IT Services
    • Support & Maintenance
    • Infrastructure Management
    • VoIP Phone Services
    • Custom Solutions
  • Resources
    • Tech Guides
    • Blog & News
  • Careers
  • Support
  • Get in Touch

Blog & News

All Categories

All Categories Best Practices Blog Posts Business Case Study Cloud Events MBTS Team Network Security News Security Tech Tips Technology Telephony Uncategorized

Alert: Acer Customer Credentials Stolen. Is Your Data Safe?

07/20/2016

If you made use of Acer’s online store to purchase a device between May 12, of 2015 and April 28, 2016, we have some bad news for you: There’s a chance you received a letter from Acer to inform you that your card’s credentials were stolen. If you have not received any letter, congratulations – […]

Read More...

FBI Warns of Potential Cyber Attack on Electric Grid

07/19/2016

While it’s not particularly common for hackers to attack physical infrastructure, the few that have occurred have been known to be quite catastrophic. For example, the Ukrainian power infrastructure was taken out by hackers just last year, leaving hundreds of thousands of citizens without power for several hours. In fact, now western countries are believed […]

Read More...

How to Get Your Employees Excited About the Cloud

07/18/2016

When it comes to implementing enterprise solutions, everybody in your organization must be on board, or else operations will be hindered. In the case of a technology like cloud computing, you may discover that some of your staff have reservations about using it. Here’s how you’ll want to address the top three misgivings about the […]

Read More...

Tip of the Week: 4 Security Best Practices You Need to Implement Right Away

07/15/2016

Cybersecurity for business contains many complexities that are often difficult to keep track of. If your organization takes a proactive approach to understanding and implementing cybersecurity best practices, you can dramatically increase the security of your organization’s network. Here are four great ways that your business can implement best practices to optimize security. Change passwords […]

Read More...

3 Innovative Ways the Cloud Enhances IT Security

07/14/2016

When it comes to cloud computing, there may still be business owners who are hesitant to take advantage of it. This may be due to major security breaches reported in the news, or just that the idea of hosting their sensitive data off-site doesn’t sit right. However, cloud computing security has come a long way […]

Read More...

1 … 88 89 90 … 101
Midnight Blue logo

Sign Up For Newsletter

Navigate

  • Solutions
  • Company
  • Blog
  • Pittsburgh

Interact

  • Support
  • Pay My Bill
  • Contact

Get Social

  • Facebook
  • Twitter
  • Linkedin

1195 Washington Pike #340, Bridgeville, PA 15017
Midnight Blue Technology Services, LP
412.342.3800

  • Privacy Policy
  • Sitemap