TopTop

Latest IT News

All
  • All
  • Burgess Technology Blog
  • IT Consulting
  • IT Security
  • IT Services
  • Latest IT News
  • Office, Email, & Web Hosting
Business Email Compromise

Business Email Compromise: Don’t Fall Victim

This month, as ever, we are thankful for our clients and our stellar staff, who support them so effectively. Not every business is so fortunate as to have these resources at their disposal. We are pleased to be able to offer both cautionary tales and examples of what can be done to protect your business. Continue Reading

Maine Cyber Horror Stories

Maine Cyber Attacks, Not Just Halloween Horrors.

We’ve shared a lot of tech horror stories from around the globe these last few months. In honor of Halloween and Cybersecurity Awareness Month, we thought we’d make it even scarier, by sharing very serious attacks by cyber ghouls here at home, in the State of Maine. State Agency Data Breach Hackers exploited a vulnerability Continue Reading

Protecting Your Network

Protecting Your Network with a Team-based Response

We recently shared a series of blog posts on protecting your network from phishing attacks specific to Impersonation Protection. We’d now like to spotlight incidents experienced by BTS clients, actions taken, and what precautions could help avoid such risks in the future. We share the first such case below: The Scenario BTS had just onboarded Continue Reading

Municipal Cyber Attack

Impersonation Protection: Municipal Cyber Attack

We wrap up our three-part series sharing real-world examples of impersonation fraud with a look at a municipal cyber attack. Below is an example of such an attack, along with explanations of the methods of attack and appropriate responses. Impersonation Protection is a cybersecurity solution designed to protect organizations from email-based impersonation attacks. These attacks Continue Reading

credit union cyber attack

Impersonation Protection: Credit Union Cyber Attack

We continue our three-part series sharing real-world examples of impersonation fraud, along with explanations of the methods of attack and appropriate responses. Impersonation Protection is a cybersecurity solution designed to protect organizations from email-based impersonation attacks. These attacks typically involve cybercriminals pretending to be trusted individuals or entities using social-engineering tactics to deceive recipients into Continue Reading

Email impersonation protection

Impersonation Protection: CEO Fraud

Impersonation Protection is a cybersecurity solution designed to protect organizations from email-based impersonation attacks. These attacks typically involve cybercriminals pretending to be trusted individuals or entities using social-engineering tactics to deceive recipients into taking harmful actions, such as revealing sensitive information, transferring funds, or clicking on malicious links. A robust cybersecurity plan uses AI-Based Comprehensive Continue Reading

security awareness

Security Awareness. Are You Leaving the Door Open for Cyber Criminals?

We can think of your business network as a house containing many valuables. The keys to your kingdom, really. It is prudent to have excellent locks, a camera system, an alarm system and other theft deterrents. But if you open the door for a criminal, there’s not much all those systems can do for you. Continue Reading

IT Network Security

Beyond the Firewall: Managed Risk, Detection and Response

There’s a misconception that a comprehensive firewall protocol is the one barrier you need to protect your business network. While it is true that this tool is critical to effective network security, there are many avenues through which malware and bad actors can access and corrupt your network. It’s important to be sure you are Continue Reading

israel-andrade-YI_9SivVt_s-unsplash

Top Tech Tips for the Non-Techie

This month, we’re focused on providing direction for less-techie folks on what actions they can employ to potentially save time and money, before calling in their local IT professionals. We also offer a list of scenarios where you absolutely should bring in an IT expert before you cost yourself more time and money than necessary. Continue Reading