ATTAIN TECHNOLOGY CYBERSECURITY Blog

Are You Being Left Behind In The Costruction Technology Craze?
Managed IT Services

Being Left Behind In The Construction Technology Craze?

I know you have been hearing that if you do not use and streamline technology in your construction company you’ll be left behind. The headlines about it are everywhere. I’ve noticed some of those headlines do not explain just how you will be left behind.  And I think that’s the

Read More »
The True Value of Quarterly Business Reviews
Managed IT Services

The True Value of Quarterly Business Reviews

Quarterly Business Reviews … What are they, why do you need them and are they veiled attempts to sell more products and services? First, let’s get that last point out of the way. Are QBR’s (Quarterly Business Reviews) really just thinly disguised attempts to sell more products and services? The

Read More »
You have a backup but are you really protected
Business Continuity

You Have A Backup – But Are You Really Protected?

I know you have been hearing a lot about ransomware attacks lately. It’s talked about almost everyday in the news.  Within the last month we’ve heard about T-Mobile, Accenture, Coglin Electrical and the Steamship Authority of Massachusetts ferry service. Unfortunately, most business owners believe they won’t be hit by a

Read More »
The Frightening Truth About Cyberattacks and Ransomware
Cybersecurity

The Frightening Truth About Cyberattacks and Ransomware

There are many challenges with building a company. As a business owner, you are overcoming one obstacle after another. There’s scaling and cash-flow, hiring and firing, competition, bidding and selling, keeping clients happy and delivering projects on time. The one challenge that you don’t hear of very often however, is

Read More »
Are You Vulnerable to Cyberattack
Cybersecurity

Are You Vulnerable To Cyberattack?

Cyberattacks are on the rise. Hackers are uniting into collectives that are partially sponsored by terrorists and antagonistic Governments to the United States. They are bent on one thing:  breaking into business networks, confiscating their data and extorting those businesses into paying them large sums of money to get access

Read More »
Passwords - Your First Line of Defense
Cybersecurity

Passwords – Your First Line of Defense

Strong Passwords Keep Your Business Safe We have all had the same frustration. You are busy working on a project at your computer, you open an app or navigate somewhere online to a tool you need to use and you are prompted to update or change your password. But you

Read More »
Why We Use Datto for Business Continuity and Disaster Recovery
Business Continuity

Why We Use Datto for Business Continuity and Disaster Recovery

The goal with cybersecurity and BCDR – otherwise known as business continuity and disaster recovery – is to protect businesses from incidents that can destroy their data and cripple their business. The problem is, there are many ways to do that. Each with their own complexities and flaws. And, there

Read More »
Your Best Odds of Stopping Phishing Attacks Cold
Cybersecurity

Your Best Odds of Stopping Phishing Attacks Cold

Every day millions of phishing emails are sent. These emails look official but are disguised to fool people into clicking a link and convincing them to provide bank account details or usernames and passwords. Hackers continue to send these emails out each day because unfortunately, they work. They work so

Read More »
Kaseya Breach and Ransomware Attack in New England
Cybersecurity

Kaseya Breach and Ransomware Attack in New England

On July 2, 2021, cybercriminals belonging to REvil committed one of the most sophisticated cyberattacks we have seen in recent years. Over the American Independence day weekend, Kaseya, a common IT monitoring tool used by many IT support and managed service providers, announced it was the victim of a cyberattack.

Read More »