TopTop

Mike Dorr, President

All
  • All
  • Burgess Technology Blog
  • IT Consulting
  • IT Security
  • IT Services
  • Latest IT News
  • Office, Email, & Web Hosting
alex-machado-80sv993lUKI-unsplash

Creating a Complete Backup Strategy

We have a couple of client case studies we’d like to share as cautionary tales, as well as examples of why you must perform a regular review of your backup protocols. We at BTS are big fans of Microsoft 365. You can find more information on the many tools and benefits here: Microsoft 365 from Continue Reading

IT network security,

How Artificial Intelligence Can Protect Your Network in Real Time

Everyone is a target for today’s most sophisticated threats. Companies, regardless of size, are vulnerable, and it is imperative to take precautions before it is too late. A recommended solution combines powerful layers of artificial intelligence and domain fraud visibility into a comprehensive cloud-based solution that guards against spear phishing, impersonation attempts, business email compromise, Continue Reading

2023 Junebanner snip

The BTS Guide to Summer Fun Apps!

  It’s that time of year again! Time for summer fun and travel. We’ve brought you some great resources over the years, sharing summer and recreation apps and tools via our blog and the IT Sucks Podcast. We’ve shared links to that content below, and also wanted to bring a few additional and new apps Continue Reading

george-prentzas-SRFG7iwktDk-unsplash

Best Practices for Cyber Security Audits 

Insurance companies are increasingly requiring businesses, particularly those in the medical and financial sectors, to have comprehensive policies to mitigate the risk of cyber-attack. Minimum requirements for cyber insurance are becoming increasingly complex. Frequently, annual cyber audits are implemented to ensure best practices are in place. The following is a list of the key protocols Continue Reading

security monitoring

What EDR Means For Your Business’ Security

  What is EDR? Endpoint Detection and Response (EDR), is an endpoint security solution which continuously monitors end-user devices to detect and respond to cyber threats, including ransomware and malware. This solution: • Records and stores endpoint-system-level behaviors • Uses various data analytics techniques to detect suspicious system behavior • Provides contextual information • Blocks Continue Reading

Email security flyer graphic

Considering An Email Protection Platform For Your Business

Email attacks are becoming increasingly complex, with many designed to target users and bypass email security gateways. You need to stay ahead of cyber criminals to protect your business and data.  Our email protection platform provides the most comprehensive protection against all 13 email threat types, from spam and ransomware to socially engineered threats such Continue Reading

michal-kubalczyk-WecngmAT-KY-unsplash

How External Vulnerability Scans Protect Your Business

Hackers continue to evolve their attack methods to capitalize on weaknesses in the external networks of governments and organizations worldwide. External vulnerability scans assess the surface area your network presents to the world and the larger internet. They are critical to taking a proactive IT security approach to protecting your business from cyber threats. What Continue Reading

ksenia-yakovleva-GJUi5qfkh-g-unsplash

Why Cyber Criminals Love the Holiday Season

The holiday season can be a time of joy, family gatherings, lovely lights and relaxing downtime. It can just as surely be a time of high stress, low patience, understaffing, harried schedules and distraction. It’s these latter qualities which make November into January a particularly attractive time for cyber criminals. Employees are likely to be Continue Reading

daniel-jensen-NMk1Vggt2hg-unsplash

Don’t Let Your Business Be A Tech Horror Story!

Don’t Let Your Business Be A Tech Horror Story! (Implement Managed Backup & Recovery IT) Halloween seemed like a good time to review some previous content related to the scary concept of losing your data! Imagine if you will, you lose all of your client contacts, your accounting files, your point-of-sale data or all of Continue Reading