Types of Phishing Attacks: Whaling, Deceptive, Pharming

May 25th, 2019 by admin

Phishing attacks occur when communication that appears to be reputable is fraudulent. The sorts of scams are made to extract personal and sensitive information from victims such as social security numbers, addresses, bank information and more. People and businesses alike are targeted for these attacks,...

Read Full Story »

Posted in: Cyber and Data Security,

MPA Networks, Inc. Receives Cybersecurity Certification

April 13th, 2019 by admin

SAN MATEO, CA – March 2019 – MPA Networks, Inc., a leading managed technology services provider, has announced that the company is certified to provide cybersecurity solutions to SMBs (small to mid-sized businesses) to protect them from the barrage of cyber-attacks that occur...

Read Full Story »

Posted in: Press Release,

Antivirus Software: When One Is Better Than Two

December 7th, 2016 by admin

If your company’s antivirus software is letting you down, you should think twice before installing a second one on a computer: It may actually make things worse. Multiple antivirus programs working in conjunction on the same device is not a case of “the sum is greater than the parts” but rather “less...

Read Full Story »

Posted in: Hardware and Software,

Treat Your Network As If It’s ALREADY Been Hacked

November 5th, 2015 by admin

Weak IT security generally revolves around the following theory: "We'll keep hackers out of our network—everything's okay until something bad happens." But strong security operates from an assume breach mindset: The hackers have already infiltrated our network, probably for a while now—where and...

Read Full Story »

Posted in: Cyber and Data Security,

The “Redirect to SMB” Bug: New Windows, Same Danger

October 6th, 2015 by admin

The big news out of Microsoft over the past couple of months is the much-ballyhooed release of Windows 10. While “Win10” finally addresses those annoying shortcomings of its predecessor Windows 8 (as we've discussed), it still hasn't corrected a dangerous security flaw known in cybersecurity circles...

Read Full Story »

Posted in: Cyber and Data Security,

The Importance of Being Proactive: Why You Need A Breach Response Plan

August 6th, 2015 by admin

Each month, Microsoft releases a new security bulletin. In May of 2015, forty-six vulnerabilities had been identified and fixed, spanning products such as Windows, Internet Explorer, and Office. In June, it was even more. While some of these vulnerabilities were low-threat, others were more critical,...

Read Full Story »

Posted in: Cyber and Data Security,

Cyber Insurance: Good for my Company?

May 20th, 2015 by admin

We've spent a lot of time on this blog talking about cyber-attacks—from nuisance hacking to data theft to virtual electronic terrorism—and the steps your company can take to defend itself. But what if, despite all your best efforts, you one day discover you've still been hacked? An insurance policy...

Read Full Story »

Posted in: Cyber and Data Security, Solutions,

Uncle Sam Won't Stop Cyber-Crime - It's Up To You

April 1st, 2015 by admin

You probably know President Obama recently hosted a high-profile cyber-security summit at Stanford. The basic idea was to discuss how to expand the federal government's role in combating cybercrime against American businesses—from simple theft to outright corporate terrorism. As you'd expect, most of...

Read Full Story »

Posted in: Cyber and Data Security,

The Ultimate IT Provider Checklist for Financial Service Firms and Investment Advisors

May 3rd, 2014 by admin

Registered Investment Advisories and other Financial Service Firms Must Choose an IT Provider Wisely Effective and reliable Information Technology plays a critical role in running a Registered Investment Advisory (RIA) firm or other financial services firm. Best-in-class technology systems are necessary...

Read Full Story »

Posted in: Partners and Industries,

Important IT Security Message for MPA Networks’ Clients

December 19th, 2013 by admin

One Malicious Email Could Cost you Thousands of Dollars and Take Down your Entire Network – Don’t be a Victim; Learn the Facts! Ransomware viruses are on the rise and their explosive growth in the past few months has been startling.  We want to help our clients be up-to-date on this issue and understand...

Read Full Story »

Posted in: Cyber and Data Security,

Protect your Business from Cyber Threats with this 5 Point Checklist

November 21st, 2013 by admin

About half of all small business owners believe their business is too small to be a potential victim for virtual thieves and hacking. The facts, however, say something quite different. The majority of cyber attacks are actually perpetrated against businesses with fewer than 100 employees. Is your...

Read Full Story »

Posted in: Cyber and Data Security,

5 Things you should do TODAY (and everyday) to preserve your IT systems

November 6th, 2013 by admin

The 5 basic tips below are essential to maintaining the health and efficiency of your network, servers, and computer systems. Please consult an expert IT Consultant or Managed Service Provider for more information about protecting your IT systems. 1. BACKUP - Data loss is a very real threat and...

Read Full Story »

Posted in: Solutions,


Back to Top

Copyright © 2019 MPA Networks, Inc.

Atomic8Ball Web Presence Management