Blog

New Emotet Trojan Poses Major Risk to Small and Midsize Businesses

Posted August 4, 2017 by Jeremy Wanamaker

Users must take responsibility to protect company networks

There is a new breed of malware that uses a sophisticated combination of phishing, brute-force password attacks, and spreader technology to infiltrate and compromise computer networks. The malware is called Emotet.

3 Tech Trends To Achieve In 2017

Posted February 21, 2017 by Ben Hicok

As you continue to map out your goals for 2017, it is important to not forget your information technology.  Where do you start?  The top 3 tech goals from CNS should be at the top of your to-do list.

Be Prepared

Posted January 16, 2017 by Ben Hicok

Disasters come from anywhere: fires, storms, power outages, even cyber-attacks. No one can know where, when or how the next disaster will strike. You care about keeping your organization focused on the future, not picking up the pieces after a catastrophe, thus investing in planning and preparation is critical.

As a responsible business owner you equip your business with all necessary protections. Fire mitigation devices and generators are installed and maintained. You have insurance to replace damaged physical property. Your employees are trained on procedures should disaster strike.

5 Signs You’ve Been Hacked!

Posted December 13, 2016 by Ben Hicok

2016 has been filled with news of cyberattacks and hacking.  Clearly, at this point no one and no business is immune to the dangers of the hacker community.  Given the onslaught of cybercrimes, what is a SMB owner to do?  You have taken what you feel are the necessary steps to keep yourself safe.  You have installed the latest firewalls. You have communicated to employees the importance of strong passwords.  Sadly, even these steps cannot guarantee your systems’ safety. You could still be victim of a hackers!

Are you making the right cloud computing choice?

Posted November 23, 2016 by Ben Hicok

As we move further and further into the technological age, it is becoming more and more apparent that it is neither desirable nor efficient for businesses to remain firmly planted to the ground.  The time has come to move to the cloud!  But with all the cloud based services out there what is a SMB owner to do?  With CNS in your corner you can be sure that your migration to the cloud will be smooth.

Building Your Plan for BYOD!

Posted October 20, 2016 by Ben Hicok

As the line between working in-office and working from home becomes more and more blurred, a new trend in employee technology has begun to emerge – BYOD, or bring your own device. Many companies are offering their employees the option to bring their own devices into the office environment as it can improve both employee satisfaction and office productivity. But CIOs still must consider three different basic set ups/options before taking the plunge:

Delta IT Disaster!

Posted August 11, 2016 by Ben Hicok

Angry customers, negative media coverage, frustrated employees, untold revenue lost, lingering anger from customers: that’s the status for Delta Airlines this week. Of course this is not news to anyone unless you have been living under a rock you have heard the numerous news reports detailing the Delta computer disaster. Whether caused by a minor power outage at Delta headquarters or an internal computer hiccup, the airline was forced to cancel over 500 flights. This caused a gridlock across America’s airports at the height of vacation season. You may not be running an international transportation corporation, but imagine what would happen to your clients if you had an unexpected IT failure. If you think something like this can’t happen to you; think again.

Cybersecurity is Important for Small Businesses

Posted August 3, 2016 by Ben Hicok

Most small business owners believe cyberattacks are the concern of large corporations, however nothing could be further from the truth.  According to Verizon Data Breach Investigations Report, 71% of cyber attacks occur at businesses with less than 100 employees.

Unfortunately, many “SMBs suffer from ‘It can’t happen to us’ syndrome,” notes Robert Siciliano, security expert for McAfee. “They also typically don’t have the resources to secure their networks to the degree a large enterprise would. But the information on their networks – and access to their bank accounts – still makes them a big target.”  Even though it turns out SMB’s have a larger target on their backs than they realize, two thirds of SMBs surveyed by Symantec say they’re not concerned about cybersecurity threats; and more than 80 percent have no formal cybersecurity plan.

How Small and Midsize Businesses will Benefit from Gigabit Internet

Posted July 29, 2016 by Jeremy Wanamaker

The arrival of low-cost Gigabit Internet is going to be a game changer for small and midsized businesses.  Cloud service adoption has been steadily gaining traction over the last few years, but the widespread availability of Gigabit Internet service will kick it into overdrive.  Low quality Internet connections have hampered cloud service adoption because of poor user experience.  Cloud-based email and browser-based SaaS run well over cable or DSL.  However, real time and high-performance applications such as hosted phones and video conferencing often suffer from poor performance when run on a low-end connection.

Use This One Simple Trick to Improve Your Organization’s IT Security Posture

Posted March 25, 2016 by Jeremy Wanamaker

Caution and Proper Use are Key

Ask anyone working in IT what the top concerns in the field are, and it’s likely most people will name IT Security near the top of the list.  The increasing frequency of news-making data breaches at high profile corporations, combined with new types of attacks in business of every size, has forced security to the forefront of our thinking.  Cryptolocker and other ransomware variants are so lucrative for cyber criminals that new variants are popping up daily.   The anti-virus vendors can’t keep up.

Historically, those working in the IT department have purchased increasingly sophisticated firewalls and security software to mitigate the threat posed by malicious software.  While technological solutions are an important aspect of an organization’s security posture, security researchers have realized that the most effective tool against hackers is proper user behavior.

What if I told you that there is one simple rule that, if followed, would prevent over 90% of data breaches and hacks at small and mid-marked organizations?


© 2017 Complete Network Support, LLC.

Serving Upstate NY in the following areas: Albany, Troy, Schenectady, Saratoga, Clifton Park
Serving NC in the following areas: Charlotte, Matthews, Monroe, Mooresville, Concord, Gastonia, Fort Mill

© 2017 Complete Network Support, LLC.

Contact & Directions