TopTop

Latest IT News

All
  • All
  • Burgess Technology Blog
  • IT Consulting
  • IT Security
  • IT Services
  • Latest IT News
  • Office, Email, & Web Hosting
Managed IT Valentine

Let Your MSP Be Your Managed IT Valentine

  Valentine’s Day is all about celebrating relationships. For businesses, one of the most crucial relationships is with your Managed IT Valentine, errr… IT Provider. As the backbone of your operations, your technology environment needs constant care and attention to keep things running smoothly. That’s where Managed Service Providers (MSPs) come in. This Valentine’s Day, Continue Reading

SOC Audit

SOC Compliance: BTS Strengthening Security and Trust

BTS Achieves SOC Compliance, Strengthening Security and Trust Burgess Technology Services is proud to announce the successful completion of its SOC 2 Type I audit. This achievement underscores the company’s dedication to maintaining the highest standards of security, availability, and data integrity for its clients. The rigorous audit, conducted by an independent third-party firm, validates Continue Reading

end-of-life technology

Technology End-Of-Life. What You Need to Know.

What is Technology End of Life? The beginning of the year is always a good time to check in with your IT vendor to see what, if any, of the software or hardware you have may be reaching its end-of-life (EOL) or end-of-service (EOS).  Technology end-of-life is an important aspect of your network and should Continue Reading

cybersecurity risks

12 Days of Cybersecurity Risks

Top Cybersecurity Risks On our social media, we counted down to the end of the year with a list of the twelve most common cybersecurity risks. It’s critically important for you and your staff to have an awareness of these potential pitfalls. Up to 95% of successful cybersecurity breaches are due to human error. Here’s Continue Reading

Business Email Compromise

Business Email Compromise: Don’t Fall Victim

This month, as ever, we are thankful for our clients and our stellar staff, who support them so effectively. Not every business is so fortunate as to have these resources at their disposal. We are pleased to be able to offer both cautionary tales and examples of what can be done to protect your business. Continue Reading

Maine Cyber Horror Stories

Maine Cyber Attacks, Not Just Halloween Horrors.

We’ve shared a lot of tech horror stories from around the globe these last few months. In honor of Halloween and Cybersecurity Awareness Month, we thought we’d make it even scarier, by sharing very serious attacks by cyber ghouls here at home, in the State of Maine. State Agency Data Breach Hackers exploited a vulnerability Continue Reading

Protecting Your Network

Protecting Your Network with a Team-based Response

We recently shared a series of blog posts on protecting your network from phishing attacks specific to Impersonation Protection. We’d now like to spotlight incidents experienced by BTS clients, actions taken, and what precautions could help avoid such risks in the future. We share the first such case below: The Scenario BTS had just onboarded Continue Reading

Municipal Cyber Attack

Impersonation Protection: Municipal Cyber Attack

We wrap up our three-part series sharing real-world examples of impersonation fraud with a look at a municipal cyber attack. Below is an example of such an attack, along with explanations of the methods of attack and appropriate responses. Impersonation Protection is a cybersecurity solution designed to protect organizations from email-based impersonation attacks. These attacks Continue Reading

credit union cyber attack

Impersonation Protection: Credit Union Cyber Attack

We continue our three-part series sharing real-world examples of impersonation fraud, along with explanations of the methods of attack and appropriate responses. Impersonation Protection is a cybersecurity solution designed to protect organizations from email-based impersonation attacks. These attacks typically involve cybercriminals pretending to be trusted individuals or entities using social-engineering tactics to deceive recipients into Continue Reading