Phishing for donations

Brittany Pescetto Cybersecurity, Phishing

While the aftermath of Hurricane Harvey continues to pummel Texas, the United States Computer Emergency Readiness Team warns of existing fictitious disaster relief scams, preying on the charitable. With August marking just over 12 years since Hurricane Katrina ravaged New Orleans, the devastation has lasted far longer than the storm, and it’s happening again. When Katrina struck, FEMA dished out nearly $500 million in federal aid, more …

Pacemaker Vulnerability

Brittany Pescetto Blog, Cybersecurity

Tuesday the FDA released a recall notice issued to those who currently have a pacemaker manufactured by the Abbott (formerly St. Jude Medical). A firmware update is now available as an emergency corrective action, to quickly reduce the risk of patient exploitation. If you’re affected by this recall, the firmware update requires in in-office visit your health care provider for …

Customer Relationship Management – Automate Your Sales and Marketing

Brittany Pescetto Blog, Tip of The Week

Manage your current and future customers with a comprehensive customer relationship management solution. As a business owner, you have a lot of responsibility. You need to consider many variables just to keep your organization productive and profitable. Your employees are behind the scenes working to make your brand the best it can be. Just as important as you and your …

Insider Threat – the Levandowski Effect

Brittany Pescetto Blog

In a recent study by IBM, reserchers found that over half of data breaches are a result of internal actors leaking sensitive data, and currently ex-engineer Anthony Levandowski is under fire for doing just that. Levandowski, a former technology lead for Alphabet, Google’s parent company, and creators of the self-driving car Waymo, is currently in the technological legal battle of his …

Wanna Cry?

Brittany Pescetto Blog

Ransomware is a malicious software that locks your data until you pay a “ransom” to retrieve it. Last week, to the terror of many business owners, WannaCry ransomware spread rapidly to over 150 countries, leaking tons of data and rendering many banks, hospitals and universities, and governments helpless against encryption.  WannaCry’s asking price? $300 in Bitcoin, a price that doubles …

Understanding PCI DSS

Brittany Pescetto Uncategorized

Panthera Technologies provides solutions for companies searching for a secure interface in which to transfer sensitive information. Does your business accept credit cards? Do you need it to? In order to open your Maryland area small business up to the enhanced profit potential that accepting credit cards can provide, you’ll need to understand what responsibilities you take on by accepting …

Understanding Automation

Brittany Pescetto Uncategorized

Business technology is the bane of the modern worker. No matter how well-intentioned the members of your staff are, when they have computer troubles, it complicates everything they are trying to accomplish. This, in turn, complicates every goal you are trying to accomplish. The automation of IT service delivery gives you a direct line to a stronger business by streamlining …

IT Services Done Differently

Brittany Pescetto Uncategorized

We’re in this business to help other small businesses grow and move forward.  It’s as simple as that.  We’re driven by the philosophy that if we help local businesses solve their IT issues so they can become more profitable and successful, then we will inherently grow along with them.  There is no catch, no gimmick, just experience and best practices …

The Modern Office

Brittany Pescetto Blog

There are countless ways the modern office transcends the office of yesteryear, but the most obvious is probably the layout. Where not long ago cubicles were all the rage, now the open office setup is most popular, as business owners and executives look to cost effective strategies to stretch their budgets and stay flexible. The open office doesn’t offer much …

Understanding Cloud Computing

Brittany Pescetto Uncategorized

Free yourself from traditional IT with Cloud Services Cloud computing is managed, shared applications, development platforms, or computing infrastructure accessible via the internet. It provides options such as bandwidth and on-demand computing power with flexible capabilities normally purchased as a metered service. The National Institute of Standards and Technology (NIST) defines cloud computing as a “model for enabling ubiquitous, convenient, …