Connect2geek.com Logo
CALL US
208-468-4323
FOLLOW US
  • Home
  • About
  • Services
    • Protect IT
    • Home Services
    • Business Services
    • Managed Cybersecurity for Microsoft 365
  • Testimonials
  • Blog
  • Contact
  • Support
    • Book a Time
    • New Client Form (Residential)
    • New Client Form (Business)
    • Customer Portal
    • Download Remote Support Tool
  • Hire Us

How to Start a Vulnerability Management Program

January 11, 2023 by Glen Michaelson

How to Start a Vulnerability Management Program

Vulnerability Management is commonly referred to as the process of identifying, classifying, mitigating, and remediating vulnerabilities. It also involves reporting, prioritization, and reaction to network vulnerabilities.  [Read more…]

Filed Under: Blog Post

Share:

Upcoming 2023 Trends to Leverage

January 4, 2023 by Glen Michaelson

Upcoming 2023 Trends to Leverage

Technologies are evolving at a fast rate, and new versions of the existing ones get released daily, causing an increase in the rate of changes. Therefore, companies must keep updating their tools to stay competitive in a technology-driven environment.   [Read more…]

Filed Under: Blog Post

Share:

3 Things That Are Proven to Lower the Cost of a Data Breach

December 28, 2022 by Glen Michaelson

3 Things That Are Proven to Lower the Cost of a Data Breach?

According to a 2022 report from IBM and Ponemon Institute (the 17th report of its kind since its inception), the cost of a data breach hit a record high of 4.35 million US dollars. This report is sourced from about 500 hack attacks in fifteen industries across seventeen countries, with data from over 3500 interviews.  [Read more…]

Filed Under: Blog Post

Share:

Is Your Company a Sitting Duck Because of Cloud Misconfiguration?

December 21, 2022 by Glen Michaelson

Is Your Company a Sitting Duck Because of Cloud Misconfiguration (

Cloud misconfiguration is one of the most common cloud security threats. It involves any error, loophole, or problem in the cloud that could be a threat to valuable assets and information stored on the cloud.  [Read more…]

Filed Under: Blog Post

Share:

Does My Company Really Need to Pay Attention to the Metaverse?

December 14, 2022 by Glen Michaelson

Does My Company Really Need to Pay Attention to the Metaverse?

The internet and other channels have given us the best experience to maximize productivity for business, which could make one skeptical about the success of another option. Have you ever thought of a virtual replica of yourself and your Company, one where you can interact and work with other people without being physically present?  [Read more…]

Filed Under: Blog Post

Share:

Mobile Malware is Increasing Rapidly: Steps to Reduce your Risk

December 7, 2022 by Glen Michaelson

Mobile Malware is Increasing Rapidly: Steps to reduce your Risk

Malware can make everything about your device feel off. The random unwanted pop-ups, unauthorized charges on your accounts, overheating, frequent freezing, and crashing, frustrate users’ experience. More harm than this can be caused due to the increasing frequency of Mobile malware Attacks. Research showed a 500% increase in mobile Malware in 2022 and also an 80% increase in banking malware attacks on Android devices; this is high and calls for mobile defense. [Read more…]

Filed Under: Blog Post

Share:

Tips for Choosing a New Computer Wisely

November 30, 2022 by Glen Michaelson

Tips for Choosing a New Computer Wisely

So, you’re thinking about buying a new computer. It’s an exciting prospect, but also a little daunting. You’re not sure what technical specifications are best for your needs, and you want to make sure you get good value for money. [Read more…]

Filed Under: Blog Post

Share:

Top Trends in Cybersecurity Insurance You Need to Know About

November 23, 2022 by Glen Michaelson

Top Trends in Cybersecurity Insurance You Need to Know About

Cybersecurity insurance is a type of business cover organizations can purchase to help them recover from the financial damage associated with cyber-attacks. This type of cover has skyrocketed over the past few years, as organizations realize that cyber-attacks are now a case of when not if. [Read more…]

Filed Under: Blog Post

Share:

How to Conduct an Effective Year-End Technology Review

November 16, 2022 by Glen Michaelson

How to Conduct an Effective Year-End Technology Review

2022 is almost drawing to a close. Now is the perfect time to review the year that’s passed by and start planning for the 12 months ahead. As you strategize for the next year, an important factor to consider is the technology you use by conducting a year-end technology review. [Read more…]

Filed Under: Blog Post

Share:

Learn Safe Setup Practices for IP Security Cameras

November 10, 2022 by Glen Michaelson

Learn Safe Setup Practices for IP Security Cameras

Internet security cameras – commonly known as IP security cameras – are becoming an increasingly popular way to improve home security. Many people use these cameras to keep an eye on their home, children or pets when out of the house. In fact, at the end of 2021, over one billion surveillance cameras were estimated to have been installed worldwide. [Read more…]

Filed Under: Blog Post

Share:

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 21
  • Next Page »

Services

  • VoIP Services
  • Computer Repair
  • Network Support
  • Data Recovery
  • Managed Services
  • Office 365
  • 24/7 Monitoring
  • Managed Cybersecurity Services
Click to Protect Your PC Now Webinars hosted by Glen Michaelson

FOLLOW US

Copyright © 2025 · Connect2geek.com