Technology Articles from MPA Networks

Providing Innovative Home Office Cybersecurity for Remote Workers

June 4th, 2020 by admin

A man working from home using a laptop and a headset

SAN MATEO, CA - MPA Networks, Inc., a leading managed technology services provider (MTSP), announced today that the company is providing home office cybersecurity for remote workers to support them through the current pandemic and beyond. According...

Read Full Story »

Posted in: Press Release

Tips to Stay Productive, Cyber-Safe, and Get the Fastest Service

March 30th, 2020 by admin

A hooded figure representing a hacker is coming out of a laptop screen

MPA has collected tips and actual client experiences & lessons about how to stay productive, cyber-safe, and get the fastest service from us right now. What's Happening Right Now The support load continues to be heavy. Some clients did not shelter...

Read Full Story »

Posted in: Press Release

Types of Phishing Attacks: Whaling, Deceptive, Pharming

May 25th, 2019 by admin

Discrete hacker looking for vulnerable code

Phishing attacks occur when communication that appears to be reputable is fraudulent. The sorts of scams are made to extract personal and sensitive information from victims such as social security numbers, addresses, bank information and more. People...

Read Full Story »

Posted in: Cyber and Data Security

MPA Networks, Inc. Receives Cybersecurity Certification

April 13th, 2019 by admin

two people shaking hands

SAN MATEO, CA – March 2019 – MPA Networks, Inc., a leading managed technology services provider, has announced that the company is certified to provide cybersecurity solutions to SMBs (small to mid-sized businesses) to protect...

Read Full Story »

Posted in: Press Release

Antivirus Software: When One Is Better Than Two

December 7th, 2016 by admin

Yellow 'Anti Virus' in yellow on a black background

If your company’s antivirus software is letting you down, you should think twice before installing a second one on a computer: It may actually make things worse. Multiple antivirus programs working in conjunction on the same device is not a case of...

Read Full Story »

Posted in: Hardware and Software

Treat Your Network As If It’s ALREADY Been Hacked

November 5th, 2015 by admin

Silhouette of Sherlock Holmes smoking a pipe and looking through a magnifying glass

Weak IT security generally revolves around the following theory: "We'll keep hackers out of our network—everything's okay until something bad happens." But strong security operates from an assume breach mindset: The hackers have already infiltrated...

Read Full Story »

Posted in: Cyber and Data Security

The “Redirect to SMB” Bug: New Windows, Same Danger

October 6th, 2015 by admin

Icon of a bug with the red, green, blue, yellow Windows logo on its carapace

The big news out of Microsoft over the past couple of months is the much-ballyhooed release of Windows 10. While “Win10” finally addresses those annoying shortcomings of its predecessor Windows 8 (as we've discussed), it still hasn't corrected a dangerous...

Read Full Story »

Posted in: Cyber and Data Security

The Importance of Being Proactive: Why You Need A Breach Response Plan

August 6th, 2015 by admin

Yellow, triangular shaped sign with a black exclamation point on it

Each month, Microsoft releases a new security bulletin. In May of 2015, forty-six vulnerabilities had been identified and fixed, spanning products such as Windows, Internet Explorer, and Office. In June, it was even more. While some of these vulnerabilities...

Read Full Story »

Posted in: Cyber and Data Security

Cyber Insurance: Good for my Company?

May 20th, 2015 by admin

Black calculator sitting on a sheet of data, next to an uncapped silver pen

We've spent a lot of time on this blog talking about cyber-attacks—from nuisance hacking to data theft to virtual electronic terrorism—and the steps your company can take to defend itself. But what if, despite all your best efforts, you one day discover...

Read Full Story »

Posted in: Cyber and Data Security, Solutions

Uncle Sam Won't Stop Cyber-Crime - It's Up To You

April 1st, 2015 by admin

Gold-colored, unlocked circular padlock with a key inserted

You probably know President Obama recently hosted a high-profile cyber-security summit at Stanford. The basic idea was to discuss how to expand the federal government's role in combating cybercrime against American businesses—from simple theft to outright...

Read Full Story »

Posted in: Cyber and Data Security

The Ultimate IT Provider Checklist for Financial Service Firms and Investment Advisors

May 3rd, 2014 by admin

Two women and a man discussing business in a conference room

Registered Investment Advisories and other Financial Service Firms Must Choose an IT Provider Wisely Effective and reliable Information Technology plays a critical role in running a Registered Investment Advisory (RIA) firm or other financial services...

Read Full Story »

Posted in: Partners and Industries

Important IT Security Message for MPA Networks’ Clients

December 19th, 2013 by admin

Cartoon of a red haired woman using a chained up computer while a man extends his hand for payment

One Malicious Email Could Cost you Thousands of Dollars and Take Down your Entire Network – Don’t be a Victim; Learn the Facts! Ransomware viruses are on the rise and their explosive growth in the past few months has been startling.  We want to help our...

Read Full Story »

Posted in: Cyber and Data Security

Protect your Business from Cyber Threats with this 5 Point Checklist

November 21st, 2013 by admin

In bold uppercase: 'Practice Cyber Safety' with the last word in red

About half of all small business owners believe their business is too small to be a potential victim for virtual thieves and hacking. The facts, however, say something quite different. The majority of cyber attacks are actually perpetrated against...

Read Full Story »

Posted in: Cyber and Data Security

5 Things you should do TODAY (and everyday) to preserve your IT systems

November 6th, 2013 by admin

Close up of a keyboard with a stethoscope resting on the left side

The 5 basic tips below are essential to maintaining the health and efficiency of your network, servers, and computer systems. Please consult an expert IT Consultant or Managed Service Provider for more information about protecting your IT systems. ...

Read Full Story »

Posted in: Solutions