When evaluating and comparing Managed Service Providers (MSP), many want to look at the options and lay them out in an apples-to-apples comparison. Something worth noting; there are over 7,500 varieties of apples. To help decode some common areas of importance, we have a few tips and questions you can ask during the exploratory stage of your search. Comparing Managed Service Provider Pricing Models Many pricing models exist in the world of MSPs - some a [...]
Third-party authentication apps, like Microsoft Authenticator, offer users a higher level of security than SMS or phone calls. But, as with all things cybersecurity-related, the tools that protect us must continue to evolve to stay ahead of bad actors. To bolster the security of push notifications, Microsoft announced new features to Authenticator’s two-factor authentication capabilities for mobile device users. Most notably among the updates, number matching and additi [...]
A scam that has regained popularity is centered around legitimate actions with Google My Business. Google My Business is an important marketing platform owned by organizations. Anyone with a Google account can request access to own or manage your My Business platform, and scammers take advantage of this loophole. How it works A scammer requests access to your Google My Business Account. You will receive an email with this request if you are the account owner. It comes from a legit [...]
Auto dealerships are now required to plan, implement, and maintain an Information Security Program to increase the private data security of individuals. Avoiding mishandling consumer data is the driving force behind this program. The Gramm Leach Bliley Act (GLBA) 15 U.S.C. § 6805, which calls for this, was designed to protect non-public consumer information collected and maintained by financial institutions. GLBA was implemented in 2003 and extended to auto dealerships in 2021. &n [...]
Bad actors are currently targeting small- to medium-sized businesses (SMBs) because they often find them less prepared to deal with a cyberattack. These organizations often take the position that “I’m too small to be a target.” This false sense of security is precisely what makes them an attractive target. This mindset can cost your business both outright, in the case of a ransomware attack, and in downtime. In fact, according to IBM, the average cost of a data breach in [...]
After becoming a parent, Kanika Chadda Gupta shifted her focus to her family and the community around her. She utilized the journalistic roots she had garnered during her time at CNN and started sharing stories full-time. As the host of the popular podcast “That’s Total Mom Sense”, Kanika uses her platform to bring a community of parents together. For her, parenting is an equalizer. Even though stories might be vastly different, the throughline is one and the same. Listen in to hear ho [...]
As with all things related to technology, change and evolution are inevitable. End of Life (EOL) is part of a typical technology lifecycle and means an application, platform, or hardware will no longer be supported by its manufacturer. No more patching or security, no more updated versions. Choosing to continue to use an application, platform, or hardware once it has reached its end of life can result in compliance issues, increased operational costs, and, as mentioned above, security [...]
At GadellNet, we continually drive toward providing our customers with the highest level of support. To upgrade our service for Mac users, GadellNet has gone through the rigorous process of becoming a part of the Apple Consultants Network. What is the Apple Consultants Network? Apple Consultants Network is a global collective of independent technology service providers who have met training and certification requirements to provide enterprise-level support for Apple pr [...]
At its core, food is a cultural experience. Bryan Dayton wants to bring that experience to his patrons with each of his five Colorado restaurants. His interest in food and the restaurant world began at an early age. He washed dishes, mopped floors, and even bartended later on. This experience, accompanied with an impressive travel résumé, gave him the foundation he needed to start his own businesses. In this episode, we discussed the need to share these experiences with others and how tha [...]
Partnering with a technology consultant can help your organization end up with the best protection. Cyber liability insurance is still a new landscape. And it’s changing a lot. Right now, Multi-Factor Authentication (MFA) is the big thing. Insurers are requiring it for coverage. However, word on the street is that they are going to start requiring Endpoint Detection and Response (EDR) and Security Information and Event Management (SIEM) protection as early as 2023 [...]