TopTop

Latest IT News

All
  • All
  • Burgess Technology Blog
  • IT Consulting
  • IT Security
  • IT Services
  • Latest IT News
  • Office, Email, & Web Hosting
stephanie-klepacki-Jh9U5__hStw-unsplash

Thanksgiving: Team BTS, By the Numbers

The Thanksgiving season got us to thinking about how grateful we are for our staff. Here’s some telling information “by the numbers”, about the stellar folks who serve our clients with responsiveness, experience and expertise. Did you know? Number of Fulltime BTS Team Members:      21 Average number of years in IT:      Continue Reading

alex-machado-80sv993lUKI-unsplash

Creating a Complete Backup Strategy

We have a couple of client case studies we’d like to share as cautionary tales, as well as examples of why you must perform a regular review of your backup protocols. We at BTS are big fans of Microsoft 365. You can find more information on the many tools and benefits here: Microsoft 365 from Continue Reading

IT network security,

How Artificial Intelligence Can Protect Your Network in Real Time

Everyone is a target for today’s most sophisticated threats. Companies, regardless of size, are vulnerable, and it is imperative to take precautions before it is too late. A recommended solution combines powerful layers of artificial intelligence and domain fraud visibility into a comprehensive cloud-based solution that guards against spear phishing, impersonation attempts, business email compromise, Continue Reading

2023 Junebanner snip

The BTS Guide to Summer Fun Apps!

  It’s that time of year again! Time for summer fun and travel. We’ve brought you some great resources over the years, sharing summer and recreation apps and tools via our blog and the IT Sucks Podcast. We’ve shared links to that content below, and also wanted to bring a few additional and new apps Continue Reading

george-prentzas-SRFG7iwktDk-unsplash

Best Practices for Cyber Security Audits 

Insurance companies are increasingly requiring businesses, particularly those in the medical and financial sectors, to have comprehensive policies to mitigate the risk of cyber-attack. Minimum requirements for cyber insurance are becoming increasingly complex. Frequently, annual cyber audits are implemented to ensure best practices are in place. The following is a list of the key protocols Continue Reading

security monitoring

What EDR Means For Your Business’ Security

  What is EDR? Endpoint Detection and Response (EDR), is an endpoint security solution which continuously monitors end-user devices to detect and respond to cyber threats, including ransomware and malware. This solution: • Records and stores endpoint-system-level behaviors • Uses various data analytics techniques to detect suspicious system behavior • Provides contextual information • Blocks Continue Reading

Email security flyer graphic

Considering An Email Protection Platform For Your Business

Email attacks are becoming increasingly complex, with many designed to target users and bypass email security gateways. You need to stay ahead of cyber criminals to protect your business and data.  Our email protection platform provides the most comprehensive protection against all 13 email threat types, from spam and ransomware to socially engineered threats such Continue Reading

michal-kubalczyk-WecngmAT-KY-unsplash

How External Vulnerability Scans Protect Your Business

Hackers continue to evolve their attack methods to capitalize on weaknesses in the external networks of governments and organizations worldwide. External vulnerability scans assess the surface area your network presents to the world and the larger internet. They are critical to taking a proactive IT security approach to protecting your business from cyber threats. What Continue Reading

ksenia-yakovleva-GJUi5qfkh-g-unsplash

Why Cyber Criminals Love the Holiday Season

The holiday season can be a time of joy, family gatherings, lovely lights and relaxing downtime. It can just as surely be a time of high stress, low patience, understaffing, harried schedules and distraction. It’s these latter qualities which make November into January a particularly attractive time for cyber criminals. Employees are likely to be Continue Reading