When evaluating and comparing Managed Service Providers (MSP), many want to look at the options and lay them out in an apples-to-apples comparison. Something worth noting; there are over 7,500 varieties of apples. To help decode some common areas of importance, we have a few tips and questions you can ask during the exploratory stage of your search. Comparing Managed Service Provider Pricing Models Many pricing models exist in the world of MSPs - some a [...]
Third-party authentication apps, like Microsoft Authenticator, offer users a higher level of security than SMS or phone calls. But, as with all things cybersecurity-related, the tools that protect us must continue to evolve to stay ahead of bad actors. To bolster the security of push notifications, Microsoft announced new features to Authenticator’s two-factor authentication capabilities for mobile device users. Most notably among the updates, number matching and additi [...]
A scam that has regained popularity is centered around legitimate actions with Google My Business. Google My Business is an important marketing platform owned by organizations. Anyone with a Google account can request access to own or manage your My Business platform, and scammers take advantage of this loophole. How it works A scammer requests access to your Google My Business Account. You will receive an email with this request if you are the account owner. It comes from a legit [...]
Auto dealerships are now required to plan, implement, and maintain an Information Security Program to increase the private data security of individuals. Avoiding mishandling consumer data is the driving force behind this program. The Gramm Leach Bliley Act (GLBA) 15 U.S.C. § 6805, which calls for this, was designed to protect non-public consumer information collected and maintained by financial institutions. GLBA was implemented in 2003 and extended to auto dealerships in 2021. &n [...]
Bad actors are currently targeting small- to medium-sized businesses (SMBs) because they often find them less prepared to deal with a cyberattack. These organizations often take the position that “I’m too small to be a target.” This false sense of security is precisely what makes them an attractive target. This mindset can cost your business both outright, in the case of a ransomware attack, and in downtime. In fact, according to IBM, the average cost of a data breach in [...]
As with all things related to technology, change and evolution are inevitable. End of Life (EOL) is part of a typical technology lifecycle and means an application, platform, or hardware will no longer be supported by its manufacturer. No more patching or security, no more updated versions. Choosing to continue to use an application, platform, or hardware once it has reached its end of life can result in compliance issues, increased operational costs, and, as mentioned above, security [...]
At GadellNet, we continually drive toward providing our customers with the highest level of support. To upgrade our service for Mac users, GadellNet has gone through the rigorous process of becoming a part of the Apple Consultants Network. What is the Apple Consultants Network? Apple Consultants Network is a global collective of independent technology service providers who have met training and certification requirements to provide enterprise-level support for Apple pr [...]
Partnering with a technology consultant can help your organization end up with the best protection. Cyber liability insurance is still a new landscape. And it’s changing a lot. Right now, Multi-Factor Authentication (MFA) is the big thing. Insurers are requiring it for coverage. However, word on the street is that they are going to start requiring Endpoint Detection and Response (EDR) and Security Information and Event Management (SIEM) protection as early as 2023 [...]
In this article you'll learn: What is CMMC and why is it important for contractors/subcontractors Provide definitions for technical acronyms associated with the CMMC process How GadellNet helps contractors navigate compliance What comes next to gain CMMC compliance Cybersecurity Maturity Model Certification, or CMMC, was released in January of 2020 by the Department of Defense (DoD). CMMC was created to properly secure data shared by the government to c [...]
Microsoft announced recently that they will begin shutting down their Basic Authentication services on October 1, 2022 forcing customers into the superior protection of Modern Authentication. GadellNet has been working with our clients to migrate to Modern Authentication since mid-2021 in an effort to maximize cybersecurity protection and minimize costs. Why Switch to Modern Authentication? Modern Authentication uses O Auth access tokens with a limited lifetime. These [...]