Maximize Remote Work

By |2020-06-24T11:28:27-05:00June 24th, 2020|Categories: Business, Work From Home|Tags: , , , |

Many companies have quickly pivoted to remote work arrangements for their employees, with some industries working from home for the first time ever. But with the rush to enable remote workforces, many employees end up working 8-12 hours a day off their laptop screens. This is not ideal, especially when working on spreadsheets and [...]

Security Tips For Working from Home [Infographic]

By |2020-04-24T12:04:53-05:00April 24th, 2020|Categories: Security, Business, Work From Home, Cyber Security|Tags: , , , , , , , , , , , , |

Download These Tips for Staying Secure While Working From Home In these crazy times, the number of people working from home has increased substantially. Our homes have become our offices, and if we're being honest here, most users are adhering to security policies in a way that's spotty, at best. At [...]

Seasonal Scams: Valentine’s Day Edition

By |2020-02-14T14:04:46-06:00February 14th, 2020|Categories: Security, Business, Cyber Security|Tags: , , , , , , , , , , , , , , , , , , , |

Social media users should be wary of romance scams as Valentine’s Day approaches, TechRepublic says. Users of dating sites and apps are particularly at risk, and TechRepublic offers a list of tips from the FBI for staying safe from these scammers.First, stick to well-known dating websites that have good reputations. Scammers are present on these [...]

New Year, Same W2 Phishing Scam

By |2020-01-23T15:57:35-06:00January 23rd, 2020|Categories: phishing, Security, Business, Cyber Security|Tags: , , , , , , , , , , , , , , , , , |

New Phishing Attack Targeting ADP Users A phishing attack claiming to be ADP – one of the world’s largest HR and Payroll companies – telling you your W2 is ready! This recycled W2 phishing scam targets payroll and HR personel. It  appears to be from a corporte executive and typically begins with a friendly [...]

Ransomware Incident Blocks Law Firms From Their Trial Records

By |2019-11-04T14:14:05-06:00November 4th, 2019|Categories: Security, Business, Cyber Security|Tags: , , , , , , , , , , , , , , , , , |

Reams of digital legal documents have been held hostage under a ransomware threat to a South Florida software company that manages electronic records for thousands of law firms nationwide. Earlier this month, TrialWorks began alerting its customers about the security breach and initially indicated it was caused by a Microsoft service outage affecting Outlook desktop [...]

Cybersecurity Awareness Month: SMB Edition

By |2019-10-24T15:04:40-05:00October 2nd, 2019|Categories: Security, Business, Cyber Security, Network|Tags: , , , , , , , , , , , , , , , , , , , , |

During the month of October, Cybersecurity Awareness Month reminds us of  category of crime tht continues to inflict companies and taxplayers with damages amounting in the billions of dollars every year. The only way to future-proof your business is by staying up to date on the latest threat landscape. To help you, here are five [...]

Manufacturing and Construction Top Targets for Business Email Compromise

By |2019-08-12T15:36:08-05:00August 15th, 2019|Categories: phishing, Security, Business, Cyber Security|Tags: , , , , , , , , , , , , , , |

Business Email Compromise Doubles in Incidents and Triples in Cost The latest data from the U.S. government’s Financial Crimes Enforcement Network shows fraud via business email is changing tactics and becoming more effective. Phishing attacks don’t always need to result in the use of malware. In many cases the goal is to commit fraud through [...]

Phishing Attacks Go Mobile

By |2019-06-26T10:47:22-05:00June 30th, 2019|Categories: Security, Business|Tags: , , , , , , , , , , , , , , , , |

Phishing Attacks Go Mobile as Cybercriminals Leverage Push Notifications Taking advantage of of the deep-seated trust in mobile content, bad guys are using phishing text messages and look-alike sites to trick users into giving up their credentials. What happens is, you will get a text from “Microsoft” stating your Office 365 password has expired with a [...]

The Difference Between Diaster Recovery & Backups

By |2019-06-25T10:27:32-05:00May 29th, 2019|Categories: Business, Backup|Tags: , , , , , , , , , , , |

Let’s start with some definitions: Disaster Recovery (DR): A strategic security planning model that works to protect a company from the effects of natural or human-induced disasters, such as a tornado or cyber attack. A DR plan aims to maintain critical functions before, during, and after a disaster event, thereby causing minimal disruption to business continuity. [...]


By |2019-04-11T10:29:36-05:00April 11th, 2019|Categories: Business|Tags: , , , , , , , , , |

We are pleased to announce the recent acquisition of DCS Computer Services of Davenport, IA. Please read the attached Press Release to learn more about the acquisition and what will happen within the next 3-6 months at RCG. This is an exciting time for everyone involved with the businesses. We appreciate the continued support and [...]