Learning & Resource Center

request it help


REQUEST AN ASSESSMENT



Blog Information

Blog

Your Guide to the Modern Varieties of Cybercriminal

To give this list a sensible order, let’s go from the small fish up to the large players, ascending the ladder in terms of threats. The Ethical Hacker First and foremost, not all hackers are bad. Certified Ethical Hackers are high-profile cybersecurity experts that...

Your Guide to the Modern Varieties of Cybercriminal

There is an entire litany of stereotypes that are commonly linked to the term “hacker," too many for us to dig into here, especially since they are only a caricature of cybercriminals today. Let’s go into the different varieties that are covered under the blanket term...

Counting the Reasons for the 3-2-1 Data Backup Rule

I hope I don’t have to tell you how important your business’ data is to its continued survival, just as I hope I don’t need to explain why this makes this data a priority to protect, regardless of your business’ size. What I do want to explain is the concept of the...

Tip of the Week: How to Take a Screenshot in Windows 10

Okay, so first off: when it comes to taking a screenshot, today’s user has a lot of options baked into Windows. Of course, there’s the Print Screen key on most keyboards—but that only allows the user to literally take a screenshot of their entire display and edit it...

How’s Your Password Hygiene?

I’m not sure we need to tell you how important passwords are: they are the front-line defense to most of the accounts you create. What is often overlooked is the strategy of how to use a password to successfully protect accounts and data. Today, we will discuss best...

Dangerous Android App Masquerading as System Update

Let’s face it, most people are glued to their phones when they have downtime. Many don’t look up to cross the street. With this much dedication to their individual mobile devices you’d think that people would be more careful about what they download. Apparently, that...

Phishing is a Huge Risk to Your Business

You’ve Probably Been Phished When trying to define phishing, we typically start with the namesake. Phishing is similar to fishing. A hacker will bait a hook and users will bite on it. It’s that simple. Instead of worms or minnows, a phishing attempt needs some bait...

Tip of the Week: How to Keep Your Team from Burning Out

Considering what the past year has been like, the idea that workplace burnout has been a hot topic isn’t all that surprising—even though less time has been spent in many offices than almost any other time to date. Regardless, burnout simply isn’t an office issue,...

Phishing is a Huge Risk to Your Business

Of all the cybersecurity considerations a modern business has to make, defense against phishing has to be at the top of any cybersecurity strategy. Let’s take a look at phishing and why it’s such a big problem for your business.  You’ve Probably Been Phished When...

2020 Was Rough for Healthcare Where IT Was Concerned

2020 was, obviously, a challenging year for healthcare providers. In addition to the obvious issue of the COVID-19 pandemic creating serious operational, financial, and supply chain difficulties, cybersecurity concerns didn’t go away during this time. Let’s consider...

IT Service Checklist for Small and Medium-Sized Businesses

Most business owners that rely on their IT have heard about managed It services. Many already subscribe to some form of outsourced IT service. It is one of the best ways to cut down your business’ operational costs while gaining value through the use of services that,...

Android Apps Suddenly Crashing? You May Have Had a Bad Update

Google’s Android operating system has about a 71.9 percent global market share, making it the most used smartphone operating system in the world. It’s well-trusted, and although the experience differs since phone manufacturers customize Android to fit their device,...

The Long and Short of Data Backup

Having a comprehensive data backup and recovery strategy in place can absolutely save your business. This means it’s extremely important. Unfortunately, too many businesses don’t consider their backup and recovery systems until it is too late. Let’s unwrap what makes...

request it help


Contact CTN

Office

610 Sentry Parkway Suite 110
Blue Bell, Pennsylvania 19422

Call Us

(610) 828- 5500

Follow Us

Request timely IT information from CTN

Skip to content