Call Us Today!302-652-3370|Client Login| info@ssdel.com
SSD Technology Partners|Managed IT Services Logo SSD Technology Partners|Managed IT Services Retina Logo SSD Technology Partners|Managed IT Services Mobile Logo SSD Technology Partners|Managed IT Services Mobile Retina Logo
  • Who we serve
    • Law Firms
    • Healthcare
    • Financial Services
    • Nonprofit & Associations
    • Other Industries
  • IT Solutions
    • Unlimited Support
    • Cybersecurity
    • Managed Services
    • Consulting Services
    • Software Development
  • Our Approach
    • Your IT Team
    • Onboarding Process
    • Best Practices
  • About Us
    • Our Story
    • Executive Leadership
    • Our Team
    • Community
    • Careers
  • Blog
  • Contact Us

Internet Security

Home/Posts/Internet Security
  • Why a Windows 10 Upgrade Makes the Most Sense for Windows 7 Users
    Gallery

    Why a Windows 10 Upgrade Makes the Most Sense for Windows 7 Users

    Cyber Security, Internet Security, IT Security, Security

Why a Windows 10 Upgrade Makes the Most Sense for Windows 7 Users

By The SSD Team| 2019-02-20T21:35:14+00:00 February 20th, 2019|Cyber Security, Internet Security, IT Security, Security|

With the clock ticking towards Windows 7 end-of-life (EOL) on Jan. 14, 2020, Microsoft recently announced that it will offer paid Extended Security Updates on a per-device basis through January 2023. The key word here is “paid.” Windows Enterprise and Microsoft 365 customers will have to cough up $25 per device for the first year, [...]

Read More
 0
  • New Research Paints an Ugly Picture of Endpoint Security
    Gallery

    New Research Paints an Ugly Picture of Endpoint Security

    Cyber Security, Internet Security, IT Security, Security

New Research Paints an Ugly Picture of Endpoint Security

By The SSD Team| 2019-01-30T20:24:28+00:00 January 30th, 2019|Cyber Security, Internet Security, IT Security, Security|

The number of successful endpoint attacks is up, the number of unknown threats is up, and the financial consequences of these attacks are more severe, according to the 2018 State of Endpoint Security Risk survey from Ponemon Institute. To make matters worse, organizations aren’t particularly confident in their ability to detect, prevent and respond to [...]

Read More
 0
  • Why Nonprofits Are Targets for Hackers and What You Should Do About It
    Gallery

    Why Nonprofits Are Targets for Hackers and What You Should Do About It

    Cyber Security, Internet Security, IT Security, Security, SMB Strategies

Why Nonprofits Are Targets for Hackers and What You Should Do About It

By The SSD Team| 2019-01-22T21:28:48+00:00 January 22nd, 2019|Cyber Security, Internet Security, IT Security, Security, SMB Strategies|

Wired magazine recently reported on the months-long struggles of a large East Coast animal shelter that had its Facebook page hacked. Using social engineering and phishing links, the hacker repeatedly accessed the account of the organization’s director, wreaking havoc on the organization. Despite exhaustive efforts to control access by implementing two-factor authentication, new antivirus software, [...]

Read More
 0
  • A Data Breach Is Inevitable. Are You Prepared?
    Gallery

    A Data Breach Is Inevitable. Are You Prepared?

    Internet Security, IT Security, Security

A Data Breach Is Inevitable. Are You Prepared?

By The SSD Team| 2018-12-18T22:05:22+00:00 December 18th, 2018|Internet Security, IT Security, Security|

Given that large enterprises with the most advanced IT security defenses in the world suffer major data breaches, no organization should assume it could never happen to them. Sure, these are high-value targets, but a growing number of hackers are going after smaller companies with weaker defenses. Organizations should always operate under the assumption that [...]

Read More
 0
  • 5 Essential Features for Password Managers
    Gallery

    5 Essential Features for Password Managers

    Internet Security, IT Security, Security

5 Essential Features for Password Managers

By The SSD Team| 2018-12-13T22:31:14+00:00 December 11th, 2018|Internet Security, IT Security, Security|

You wouldn’t ask Anne in accounting or Sam in sales to configure your firewalls, install an encryption solution or apply security patches. Yet most companies consistently make regular employees responsible for one of the most critical pieces of security — the password. Spoiler alert: It doesn’t work very well. Despite greater focus on improving security [...]

Read More
 0
  • And the Top Vulnerabilities with the Potential to Do Major Damage Are…
    Gallery

    And the Top Vulnerabilities with the Potential to Do Major Damage Are…

    Internet Security, IT Security, Security

And the Top Vulnerabilities with the Potential to Do Major Damage Are…

By The SSD Team| 2018-12-11T18:10:48+00:00 December 11th, 2018|Internet Security, IT Security, Security|

Some people might think warnings about IT security threats are overblown. That’s how they justify their “it will never happen to me” mentality. But what about the Equifax breach last year that exposed the personal data of nearly half of the U.S. population? What about the WannaCry ransomware attack that affected more than 200,000 computers [...]

Read More
 0
  • Email-Based Data Loss Prevention Protects Data without Impacting Productivity
    Gallery

    Email-Based Data Loss Prevention Protects Data without Impacting Productivity

    Cyber Security, Email, Internet Security, IT Security, Security

Email-Based Data Loss Prevention Protects Data without Impacting Productivity

By The SSD Team| 2018-12-18T22:07:04+00:00 November 6th, 2018|Cyber Security, Email, Internet Security, IT Security, Security|

Cybersecurity professionals tend to lose sleep over hackers from every corner of the globe who try to steal data and disrupt business operations. However, insider threats have also become a growing problem. And those threats that exist right under your nose are difficult to detect and costly to manage. Research from the Ponemon Institute found [...]

Read More
 0
  • Why Cybercrime Is So Painful for Midsize Companies
    Gallery

    Why Cybercrime Is So Painful for Midsize Companies

    Cyber Security, Internet Security, Security

Why Cybercrime Is So Painful for Midsize Companies

By The SSD Team| 2018-09-11T18:16:48+00:00 September 11th, 2018|Cyber Security, Internet Security, Security|

Just how frequently are cyberattacks happening? According to a new Osterman Research study, U.S.-based organizations experienced an average of 1.8 very serious security events in 2017, more than twice the global average (0.8 percent). These are events that disrupted normal operations or completely shut down an organization’s IT infrastructure for at least one day. Just [...]

Read More
 0
  • New Wi-Fi Protocol Provides Greater Security
    Gallery

    New Wi-Fi Protocol Provides Greater Security

    Cyber Security, Internet Security, Security

New Wi-Fi Protocol Provides Greater Security

By The SSD Team| 2018-08-01T23:49:20+00:00 August 1st, 2018|Cyber Security, Internet Security, Security|

Although Wi-Fi is now integral to the operations of many businesses, it is inherently less secure than wired networks. The WPA2 (Wi-Fi Protected Access 2) security protocol helps protect Wi-Fi communications by encrypting data traveling over the network. However, a vulnerability discovered in October 2017 has spurred the development of a new protocol that provides [...]

Read More
 0
  • How Next-Generation Endpoint Protection Stops Unknown Threats
    Gallery

    How Next-Generation Endpoint Protection Stops Unknown Threats

    Cyber Security, Internet Security, IT Security, Security, Uncategorized

How Next-Generation Endpoint Protection Stops Unknown Threats

By The SSD Team| 2018-07-24T22:30:30+00:00 July 26th, 2018|Cyber Security, Internet Security, IT Security, Security, Uncategorized|

It’s no secret that today’s hackers take a more sophisticated approach to cybercrime than the stereotypical 20-year-old living in his parents’ basement. Hackers do a lot of research to learn about their targets and find vulnerabilities. They develop advanced solutions and look for help on the dark web. They’re master impersonators and manipulators. Most importantly, [...]

Read More
 0
1 2 3 Next

Subscribe to Email Updates

Recent Posts

  • Why a Windows 10 Upgrade Makes the Most Sense for Windows 7 Users
  • New Research Paints an Ugly Picture of Endpoint Security
  • Why Nonprofits Are Targets for Hackers and What You Should Do About It
  • 5 Questions to Ask When Considering Custom App Development
  • SaaS or Custom App? How to Choose the Right Model

Posts By Topics

  • Artificial Intelligence (1)
  • Backup Recovery (6)
  • Big Data (3)
  • Business Continuity (3)
  • BYOD (6)
  • Cloud computing (21)
  • Collaboration (7)
    • Customer-Centric (1)
  • Custom Application Development (10)
  • Cyber Security (58)
  • Data Analytics (2)
  • Data Governance (2)
  • Data Storage (3)
  • Digital Transformation (2)
  • Disaster Recovery (2)
  • Email (3)
  • Internet Security (56)
  • IT budgeting and planning (21)
  • IT Management (26)
  • IT Outsourcing (4)
  • IT Security (74)
  • IT Services (15)
  • Managed Services (38)
  • Mobility (7)
  • Network Infrastructure (8)
  • Regulatory Compliance (4)
  • Security (77)
  • SMB Strategies (28)
  • Software Development (3)
  • Software-as-a-service (3)
  • Storage (1)
  • Technology (9)
  • Uncategorized (9)
  • Unified Communications (2)
  • Videos (3)
  • Virtualization (1)
  • VoIP (2)
  • Wi-Fi (5)
  • WLAN (1)

Contact Us

1024 Justison Street
Wilmington, DE 19801

Phone: 302-652-3370

Fax: 302-652-4591

Email: sales@ssdel.com

SSD Technology Partners

Since all businesses have different needs, our IT Consulting professionals can provide unique IT Solutions to fit the specific needs of your organization. Whether it is Managed IT Services, Software Development, Security Services or Cloud Computing, we are driven to provide superior service to give you the freedom to focus on the core purpose of your business.

Recent Posts

  • Why a Windows 10 Upgrade Makes the Most Sense for Windows 7 Users
  • New Research Paints an Ugly Picture of Endpoint Security
  • Why Nonprofits Are Targets for Hackers and What You Should Do About It
  • 5 Questions to Ask When Considering Custom App Development
  • SaaS or Custom App? How to Choose the Right Model

Recent Tweets

  • Most passwords are ineffective at preventing unauthorized access. Here are tips for improved password management.… twitter.com/i/web/status/1…

    19 hours ago
  • Mixing on-premises and cloud services can be challenging. Here’s how to ensure the success of your hybrid #cloud.… twitter.com/i/web/status/1…

    21 hours ago
  • Does your wireless network deliver the performance and capacity you need? Proper planning, management and troublesh… twitter.com/i/web/status/1…

    2 days ago

Categories

  • Artificial Intelligence
  • Backup Recovery
  • Big Data
  • Business Continuity
  • BYOD
  • Cloud computing
  • Collaboration
  • Custom Application Development
  • Customer-Centric
  • Cyber Security
  • Data Analytics
  • Data Governance
  • Data Storage
  • Digital Transformation
  • Disaster Recovery
  • Email
  • Internet Security
  • IT budgeting and planning
  • IT Management
  • IT Outsourcing
  • IT Security
  • IT Services
  • Managed Services
  • Mobility
  • Network Infrastructure
  • Regulatory Compliance
  • Security
  • SMB Strategies
  • Software Development
  • Software-as-a-service
  • Storage
  • Technology
  • Uncategorized
  • Unified Communications
  • Videos
  • Virtualization
  • VoIP
  • Wi-Fi
  • WLAN

Subcribe Now

Copyright 2015 - 2017 SSD Technology Partners - 1024 Justison Street, Wilmington, DE 19801 Phone: 302-652-3370
| Site Maintained by Skillful Antics
FacebookLinkedinTwitter