Blog & News
contact us
News Information
Latest News
2022 Cybersecurity Trends
It's not a surprise, in the new year, hackers will try to take advantage of your employees through these 2 trends: Social Engineering Remote Work Social engineering manipulates people into giving up confidential information. Most commonly, the hacker tries to lure a...
The Financial Worth of Cybersecurity
Online healthcare, online banking, online shopping and online interaction — almost everything now has a digital version, and with that comes the need for online information protection. Each day there are millions of attacks made around the globe and the majority are...
Small Businesses Need Cybersecurity, Too
Are you a recent startup company? Do you have a small office? Are you just getting into the digital world? Whatever the situation is, if you are a small business, you also need to have cybersecurity. There are compliance regulations that require any company that...
Securing Your Business: The Basics of Employee Cybersecurity Training
Have you heard about cyber criminals dumping thumb drives loaded with malicious code in employee parking lots, waiting for one to be picked up and plugged into a work computer? Pretty clever, right? Unfortunately, studies have found that 60% of people will do just...
CTN Supports Kelly’s Kidz
CTN Solutions purchased trucks, games, dolls, books, sleeping bags, and more for Kelly’s Kidz in November. This ongoing fundraiser collects toys for the patients of St. Christopher’s Hospital for Children, in Philadelphia. CTN’s favorite traffic reporter Bob Kelly of...
Are Your Company Defenses Ready for a Cyberattack?
Can you ever be ready for a cyberattack? Yes, you can! Asking if you are ready for a cyberattack is like asking if you are ready for an accident. When an accident occurs, you have the insurance coverage needed to take care of the problem. With a cyberattack, if you...
To BYOD, or Not To BYOD? That is the Question
BYOD refers to “bring your own device” — a business environment where employees of an organization are permitted to use their own laptops, tablets, and smartphones instead of company-issued equipment. Why is this allowed? Aside from saving money, the primary reasons...
A Dynamic Shift in Flexible Working Environments
Recent data indicates that 40% of Americans who are currently employed would only consider a new job if it was at least partially out of the office. Fifteen percent of these people further noted they would only consider remote work. And 25% percent of them said, if...
Welcome to Cybersecurity Awareness Month!
October is recognized as cybersecurity awareness month. Hard to believe, but this marks the 18th year. Jointly formed by the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cyber Security Alliance (NSCA), the object of cybersecurity awareness...
Training is a Cyber Crime Defense
An average organization is targeted by over 700 social engineering attacks in a year. Secure email gateways are no longer sufficient to defend against today’s sophisticated social-engineering attacks. Phishing is old news, but hackers are inventing ingenious ways to...