Blog & News

request it help

News Information

Latest News

Top 10 Terrifying Cybersecurity Statistics

If your business is not prepared, everything could be lost in a cyberattack. Here, CTN compiled statistics to illustrate the reality of an attack and the immediate need to prepare your defenses.   10. Cybersecurity should be top-of-mind for businesses. Everybody...

State of IT Staffing

A recent report by Staffing Industry Analysts (SIA) indicated that technology is the second largest area for needing to hire within organizations, for the second half of the year. Unfortunately for senior managers, the already rising demand for tech talent brings...

Lackluster Risk Management and the Rising Cost of Cyber Insurance

The recent second quarter report by The Council of Insurance Agents & Brokers indicated that while commercial insurance prices saw an average increase of about eight percent, cyber insurance premiums jumped more than three times that, to nearly 26%. A school board...

Hybrid Work and Technology Best-Practices

With an estimated 60% of the U.S. workforce choosing the hybrid work option, according to a Gartner analyst, businesses must be sure to provide the ideal technology and in-office environments to make employee life easier.  Tech This may be obvious, but just about...

Healthcare Industry Cyber Threats Significantly on the Rise 

Have You Seen Any of These Headlines? “Healthcare data breach: 2.4m records potentially exposed at Forefront Dermatology”  “Data breach may have compromised up to 68,000 Advocate Aurora Health patients’ info” “Data Breach at UC San Diego Health” “US medical imaging...

Your Guide to the Modern Varieties of Cybercriminal

There is an entire litany of stereotypes that are commonly linked to the term “hacker," too many for us to dig into here, especially since they are only a caricature of cybercriminals today. Let’s go into the different varieties that are covered under the blanket term...

Privacy Engineering Is The Key To A More Secure Future

Data privacy is a hot topic in today’s business environment, especially with high-profile hacks and ransomware attacks emerging and putting organizations at risk. In particular, the emerging concept of “privacy engineering” has a...

Hackers Use The Pandemic To Send Out Phishing Threats

The first half of this year has seen its fair share of ups and downs, especially on a global scale. With a global pandemic still taking the world by storm, it’s despicable that hackers would take advantage of the opportunity to make a quick buck using phishing...

How to Get the Most Out of Your VoIP System

By now you’ve heard of VoIP (Voice over Internet Protocol), the telephone system that runs through your Internet connection rather than a phone line. VoIP can save your business up to 60 percent off your current phone bill. What many people don’t know—even ones that...

request it help

Contact CTN


610 Sentry Parkway Suite 110
Blue Bell, Pennsylvania 19422

Call Us

(610) 828- 5500

Follow Us

Request timely IT information from CTN

Skip to content