Author Archive

5 Reasons To Work With A Telecom Agent

5 Reasons To Work With A Telecom Agent

February 7, 2017
0
Ashley McDaniel

The world of telecommunications is changing rapidly. Keeping up with these changes can be a daunting task when added to all your other daily responsibilities. Consider these 5 reasons to work with a telecom agent to lighten your load while in many cases reducing your monthly telecom expenses.

Read More
Windows 10

Windows 10

May 7, 2016
0
Ashley McDaniel

Free Windows 10 Upgrade – Until July 29th, 2016

(And how it does more than just securing your information)

Many of you may be aware that Microsoft is offering free upgrades from Windows 7, 8, & 8.1 on supported machines to Windows 10. However, this free upgrade offer lasts only until July 29, 2016.

The standard operating system for the large majority of our commercial customers is Windows 7 Pro. Microsoft’s official end of sale for Windows 7 Pro is the end of October 2016. Thus new PCs purchased after that date will have Windows 10 installed. Microsoft’s free upgrade offer for existing Windows 7 Pro (and 8 and 8.1) is an excellent opportunity to get a head start on bringing your installed base of PCs to what will be the next business standard opeating system, Windows 10.

Broadtek has installed a sizeable number of Windows 10 systems and upgraded many Windows 7 machines. We are using Windows 10 ourselves and find that it performs well, has excellent compatibility with existing applications, broad printer support, and most importantly is very stable. Regarding performance, it actually requires fewer system resources than Windows 7, and many users find that existing systems perform better on Windows 10 at the same level of memory and processor of a Windows 7 machine.

Click here to upgrade your systems directly from Microsoft. The application is straightforward and we’ve seen very few problems although some interaction is required per machine that will require your attention during the upgrade process. At Broadtek, we’ve developed our own process for upgrading a quantity of systems and offer this service to our customers at a low flat rate cost per machine which includes sorting out any problems that might occur during the process.

In our opinion, the Windows 7 end of sale combined with the robust performance and stability of Windows 10 makes a strong case to move to the next Windows standard. Whether you do this on your own or take advantage of our services to assist, we encourage you to make this move before the upcoming deadline. To learn the details of our upgrade services, please contact your Broadtek account representative soon.

Read More
Email Phishing, Spear Phishing

EMAIL PHISHING

November 16, 2015
0
Ashley McDaniel

Broadtek Fights Email Phishing & Spear Phishing


Recently, the FFIEC issued a warning to financial institutions of an increased threat of cyber-attacks. Banks as well as other types of companies are finding ransomware installed on their networks in effort to extort a ransom. Broadtek has identified and cleaned several of these ransomware cyber-attacks which began with a spear phishing email to upper level executives in various sectors.

Email Phishing continues to be a commonly used method of attack in most sectors. The Symantec Intelligence Report September 2015 indicated that Finance, Insurance & Real Estate sector made up 27% of the targeted attacks where systems were comprised using spear-phishing. Most targeted organizations had fewer than 250 employees.

Read More

SECURING YOUR BUSINESS: PART TWO

October 1, 2015
0
Ashley McDaniel

The SolutionCisco Meraki MX Security Appliance

(And how it does more than just securing your information)

Cisco Meraki MX Unified Threat Management provides the full range of data security protection including firewall, intrusion prevention, anti-virus and anti-phishing, content filtering, safe-search enforcement, malware protection, IPsec VPN connectivity, and more. Plus all of this is included for one cost in a single and simple to understand advanced security license.

Meraki MX will automatically detect and classify the devices attached to your network including notebook computers, iPads, iPhones, and Android devices. You can easily set policies to control access by these devices such as making sure they don’t introduce viruses or vulnerabilities to your network.

Internet content filtering assures that you’re in charge of your company’s Internet resources. You can restrict or report on inappropriate use. A simple interface lets you set rules for the entire network, groups or individual users as you see fit.

Meraki MX lets your provide your customers or guest access to the Internet over your wireless network while keeping them safely segregated from your systems. You can limit how much bandwidth access you give guest machines as well as prevent them from accessing objectionable websites.

Maintaining and managing competing systems to the Meraki MX brings to mind words like difficult, complex, or highly technical. Take one look at Meraki’s cloud based management dashboard and you’ll think of words like simple, intuitive, or instinctive.

Contact Broadtek today to learn how you can enjoy the peace of mind that Cisco Meraki security brings to your organization.


MIKE BUCHANAN

Read More
Cisco, Meraki,

SECURING YOUR BUSINESS: PART ONE

September 30, 2015
0
Ashley McDaniel

The Problem Securing your business and personal information

(And why it’s a bigger problem than you make think)

One of the most prevalent and malicious threats to your information is non-targeted malware. The breadth of these attacks is staggering. Symantec reports there were more than 317 million new pieces of malware created last year, meaning nearly one million new threats were released into the wild each day. Simply opening an email and clicking what appears to be a legitimate link may infect your systems with malware. Malware attacks may hijack your system for spammers without your knowledge, steal your customer information, and obtain passwords and account information.

While most malware and viruses are not targeted to any specific organization or business, targeted attacks use a range of tools and exploits to hit a specific organization. You may think these targeted attacks are aimed only at very large organizations, particularly when one of these makes the national news. However, fully 60% of targeted attacks last year struck small and medium sized organizations.

Today you have to look beyond your computer as well. With Internet and/or wireless connected devices such as Smartphones, tablets and iPads, printers, credit card readers, etc., it takes more than a simple PC based anti-virus to protect and secure your valuable information.


MIKE BUCHANAN

Read More