The IT Blog

October is Cybersecurity Month – How to Stay Safe Online

It’s easy to stay safe online – A Message from our president, Edward Davis. October is Cybersecurity Awareness Month, a global effort to help everyone stay safe and protected when using technology whenever and however you connect. Systems Support Group, Inc. is proud to be a Champion for the 7th year and support this online … Continue reading

2 Factor Authentication, 24x7x365 Network Monitoring, 3rd Party Software Update Management, Cloud, Cloud Based Backup & Recovery, Communication, Device Management, Disaster Planning, Help Desk Support, Help Desk Support, Hosting, Managed IT, Mobile, Mobile Device Management, On-Site Support, Point-To-Point Connections, Secure Remote Access, Security, Security Audits, Security Training for Executives & Employees, VPNs

Business Security Risk Is Changing In Front of Our Eyes

There have been several stories in the news recently that highlight how hackers are changing their tactics to infiltrate and disrupt our businesses. I thought I would describe how two of the most recent incidents occurred so that we can all evaluate how well we are protected and how to enhance that protection.  These are … Continue reading

Security, Security Audits, Security Policy, Security Support, Security Training for Executives & Employees, Virtual CIO

What does the Cloud do for your business?

by Ed Davis, CEO, Systems Support Group What is the Cloud? According to Wikipedia™, “Cloud computing, also known as ‘on-demand computing’, is a kind of Internet-based computing, where shared resources, data and information are provided to computers and other devices on-demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of … Continue reading

Cloud, Cloud Based Backup & Recovery, Security

Communication Takes on Many Forms

by Ed Davis, CEO, Systems Support Group Communications is the most critical form for human interaction, and is the basis for businesses to function effectively and successfully. Regarding the role of technology, communication takes on many forms and involves many different hardware and software options and solutions. The first device that comes to all of us … Continue reading

Communication, VoIP

Cyber-Security Begins With a Password

According to Wikipedia™, “a cyber-attack is any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system.” Stories … Continue reading

Security, Security Training for Executives & Employees

3 Security Factors to Look for In Your Business’s Network

A business is always at risk of being destroyed, be it online or offline. According to a study by 1&1, 67 percent of people confirmed that someone they know has had information stolen from them while online. In order to prevent your business from joining this statistic, there are several features you should look for … Continue reading

24x7x365 Network Monitoring, Cloud Based Backup & Recovery, Disaster Planning, Managed IT, Security

Managed IT. Evolved.