Ways to Check if Your Email Has Been Compromised

Written by: Mike Copen Technology Business Engineer NET Xperts LLC Unable to log into email  If your account has been compromised, a malicious attempt may have occurred to change your password without you knowing.   Email being sent from your account without interaction  Your email is most likely being used to send spam or trying to gather more information from replies […]

Cybersecurity Tips for Non-Profits

Written by: Mike Green Director of Sales NET Xperts LLC According to the AICPA (American Institute of Public Accountants) over 90% of corporate breaches start with a phishing email.  Unfortunately, far too many Non-Profit organizations do not have or know of a policy that identifies how their organization handles cybersecurity risk and data privacy.  Cybersecurity is a real concern that […]

Nonprofits: What Are Your Cybersecurity Risks?

Written by: Matt Sabo Technology Business Consultant NET Xperts LLC Did you know that more than 80% of nonprofits do not have a strategy in place to deal with cyber-attacks?  Unfortunately, cybercriminals oftentimes pick on the weakest and easiest targets and the primary intent is usually to make money. Most nonprofits do not address these hackers, not because there is a […]

The Most Common Types of Network Vulnerabilities

Written by: Kevin Daly Senior Technology Business Engineer NET Xperts LLC Network vulnerabilities fall into three categories.  These categories are Hardware-Based, Software-based, and Human-based  Hardware-based:   It is important to keep the software and firmware up to date on all of your devices.  As vulnerabilities are discovered reputable vendors will release updates that will address the vulnerabilities.  It is also important to […]

What You Need In An Email Security Service

Written by: Mike Mannarino Technology Business Consultant NET Xperts LLC In the fast-paced world we live in, your email security needs to go beyond traditional email filtering. I am often asked if I only did one thing for protecting our systems, what would it be? I always reply “end–user training.”   Your most valuable and most vulnerable asset is your employees. Performing phishing simulations and awareness training can give your employees a peek […]