Looking For a Comprehensive Endpoint Security Tool?

Written by: Nick Lindemann Managed Services Administrator NET Xperts LLC When shopping around for endpoint security, it’s easy to get lost in the massive lists of features that all sound nice, but don’t really translate well into telling you what to expect.  At the end of the day we all have the same question when it comes to security:  Will it […]

Ways to Check if Your Email Has Been Compromised

Written by: Mike Copen Technology Business Engineer NET Xperts LLC Unable to log into email  If your account has been compromised, a malicious attempt may have occurred to change your password without you knowing.   Email being sent from your account without interaction  Your email is most likely being used to send spam or trying to gather more information from replies […]

Cybersecurity Tips for Non-Profits

Written by: Mike Green Director of Sales NET Xperts LLC According to the AICPA (American Institute of Public Accountants) over 90% of corporate breaches start with a phishing email.  Unfortunately, far too many Non-Profit organizations do not have or know of a policy that identifies how their organization handles cybersecurity risk and data privacy.  Cybersecurity is a real concern that […]

Nonprofits: What Are Your Cybersecurity Risks?

Written by: Matt Sabo Technology Business Consultant NET Xperts LLC Did you know that more than 80% of nonprofits do not have a strategy in place to deal with cyber-attacks?  Unfortunately, cybercriminals oftentimes pick on the weakest and easiest targets and the primary intent is usually to make money. Most nonprofits do not address these hackers, not because there is a […]

The Most Common Types of Network Vulnerabilities

Written by: Kevin Daly Senior Technology Business Engineer NET Xperts LLC Network vulnerabilities fall into three categories.  These categories are Hardware-Based, Software-based, and Human-based  Hardware-based:   It is important to keep the software and firmware up to date on all of your devices.  As vulnerabilities are discovered reputable vendors will release updates that will address the vulnerabilities.  It is also important to […]