Blog

October is Cybersecurity Month – How to Stay Safe Online

It’s easy to stay safe online – A Message from our president, Edward Davis. October is Cybersecurity Awareness Month, a global effort to help everyone stay safe and protected when using technology whenever and however you connect. Systems Support Group, Inc. is proud to be a Champion for the 7th year and support this online … Continue reading

2 Factor Authentication, 24x7x365 Network Monitoring, 3rd Party Software Update Management, Cloud, Cloud Based Backup & Recovery, Communication, Device Management, Disaster Planning, Help Desk Support, Help Desk Support, Hosting, Managed IT, Mobile, Mobile Device Management, On-Site Support, Point-To-Point Connections, Secure Remote Access, Security, Security Audits, Security Training for Executives & Employees, VPNs

Business Security Risk Is Changing In Front of Our Eyes

There have been several stories in the news recently that highlight how hackers are changing their tactics to infiltrate and disrupt our businesses. I thought I would describe how two of the most recent incidents occurred so that we can all evaluate how well we are protected and how to enhance that protection.  These are … Continue reading

Security, Security Audits, Security Policy, Security Support, Security Training for Executives & Employees, Virtual CIO

Communication Takes on Many Forms

by Ed Davis, CEO, Systems Support Group Communications is the most critical form for human interaction, and is the basis for businesses to function effectively and successfully. Regarding the role of technology, communication takes on many forms and involves many different hardware and software options and solutions. The first device that comes to all of us … Continue reading

Communication, VoIP

Cyber-Security Begins With a Password

by Ed Davis, CEO, Systems Support Group According to Wikipedia™, “a cyber-attack is any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target … Continue reading

Security, Security Training for Executives & Employees

Managed IT. Evolved.