Blog & News
contact us
News Information
Latest News
Safeguarding Your Online Transactions: A Guide to Secure Credit Card Use
Online shopping and electronic payments have become a part of our daily lives. While the convenience is undeniable, it's crucial to be aware of the cybersecurity risks associated with online transactions. Here are some essential tips to help you use your credit cards...
The Latest Email Threats
Email threats continue to adapt and become more sophisticated. Recently, there has been a significant surge in three specific types of email-based attacks: toxic calendar invites, ShareFile phishing, and voicemail-based phishing attempts. Understanding these threats...
The Importance of Proper E-Waste Disposal for MSPs
Managed Service Providers (MSPs) play a crucial role in managing and maintaining IT infrastructure for businesses. One often overlooked aspect of this responsibility is the proper handling and disposal of electronic waste (e-waste). E-waste includes discarded...
A Million PhaaS Attacks in Two Months
Phishing-as-a-Service (PhaaS) has emerged as a significant threat. According to a recent article on SmarterMSP, over a million PhaaS attacks were recorded in just two months, highlighting the growing sophistication and prevalence of these attacks. PhaaS provides...
Mastering Post-Incident Reviews: A Guide to Effective Incident Response
Security incidents are inevitable. Whether it's a phishing attack, a system outage, or a misconfiguration, what truly matters is how you respond to and learn from these events. Conducting a post-incident review (PIR) is crucial for strengthening your security posture...
Employee Spotlight: Max Bautista!
Max is April's employee spotlight! Max has been with CTN for over a year working as a systems engineer. Before working at CTN, what was the most unusual or interesting job you’ve ever had? I haven't had many serious jobs outside of IT- so I'd have to say CTN is the...
Phishing-as-a-Service: A Growing Threat
A new and alarming trend has emerged: Phishing-as-a-Service (PhaaS). This innovative yet dangerous model is transforming the way cybercriminals conduct phishing attacks, making it easier and more accessible for even novice attackers to launch sophisticated campaigns....
Navigating Personal Use on Work vs. Personal Computers: Do’s and Don’ts
In today’s interconnected world, it’s common to blur the lines between work and personal life, especially when it comes to computer use. However, it’s crucial to understand the do’s and don’ts of using your work computer for personal tasks and vice versa. Here’s a...
Employee Spotlight: William Hudspeth Blackburn!
William is January's employee spotlight! William has been with CTN for 1 year working as a Technical Account Manager. Before working at CTN, what was the most unusual or interesting job you’ve ever had? When I was 15-16, I managed a team of volunteers for a Dementia...
Your Best Computer Habits for the New Year
As we embark on a new year, it's the perfect time to adopt new habits and improve our routines. Why not extend your list of New Year's resolutions to include better computer habits? Here are some essential hygiene, transport, and security practices to keep your...
CONTACT US
Contact Us







