Blog Articles from Cantrell’s Information Technology
How To Know Your Data Is Secure: Prove It
Do you know your data is secure, or are you just assuming? And by “secure,” I mean safe from other people’s eyes as well as recoverable. We’ve talked about the multiple ways to keep unwanted people out of your information: Educate your people. Have complex and...
Is Your Phone Really Protecting You? The Downside of Using Text for 2 Factor Authentication
Two-factor authentication is a critical security measure in today’s digital world. As hacker creativity increases, so does the need for securing your online accounts. That is why many sites encourage – or require – confirmation that you are, in fact, you: two-factor...
How a Computer Refresh Now Could Benefit Your Business
You may have heard that computer sales are down. In fact, Computerworld put it rather bluntly in their article PC sales fall off a cliff. Obviously, as a business that sells computers, this headline is a bit startling. On the other hand, as a small business owner...
Having Cybersecurity is More Powerful than Just Thinking About It
A common theme among small business owners is the thoughts they have about improving their cybersecurity. For these individuals, the priority ebbs and flows based on local news of successful hacks or a colleague’s bad experience. It is likely they may have been...
Is there a Way to Protect Your Business from Password Fatigue?
We regularly encourage readers to implement password policies that ensure users use strong passwords and change them regularly. While great for cyber-security, this policy can result in password fatigue and cause other problems down the road. After all, who actually...
True Cybercrime Horror Stories: It Can Happen to Your Business
Too many business owners think that cybercrime won’t happen to them. They are too small, they are not a “name brand,” why would anyone bother? Why? Because when a company is small and unknown, they are generally easier to hit. The following is a true story of a client...
The Best Way to Protect Yourself from Cybercrime Is to Stay Current
There are multiple cybersecurity products out there, and so many terms thrown about, it is easy to feel confused about protecting yourself and your business from cybercrime. Before spending a great deal of time and money figuring out a new solution, do yourself a...
Attack Surface: What Is It and Why Your Business Cares
If you try to keep up on the latest in IT and cyber-security, you are probably hearing a lot about Attack Surface Management (ASM). However, unless you are specifically in business for IT and/or cyber-security, you probably have not been able to make a lot of sense of...
How to Take Charge and Protect Your Business from Tech Support Scams
Would you believe that not all technical support representatives have your best interest at heart? While we know that everyone has had a bad support experience at some point, we are not referring to grumpy technicians; instead, we mean scammers posing as support...
What Kinds Of Businesses Need On-site IT Services?
What Kinds Of Businesses Need On-site IT Services?On-site IT services are offered mostly by companies that deal with technology and its related business like computer support, data recovery and others. However, on-site service offers a more hands-on approach when it...
What 3 Questions Should You Ask Before Hiring An On-site IT Service Provider?
What 3 Questions Should You Ask Before Hiring An On-site IT Service Provider?As businesses rely more on technology it is crucial to have a relationship with an IT service provider you can trust. And just as with any business relationship, the first step involves...
What Kinds Of Things Does An On-site IT Service Handle?
What Kinds Of Things Does An On-site IT Service Handle?This is a hard question to answer because it depends on what you need IT service for, and the size of your company. Each business is unique in some way. But some examples include: Supplying a new computer to an...
Do You Need a Professional Cybersecurity Team You Can Trust?
Cantrell’s Information Technologies has been providing cybersecurity to business owners throughout the San Francisco Bay Area for over 20 years. We provide multiple layers of security for HIPAA, FINRA, and PCI compliance as well as training against IT threats when it comes to computer viruses. We also provide local classroom and small group training, web-based training and simulated phishing attacks to help end-users better understand and defend against cyber threats. Many of our customers initially work with us to help them improve the way they store, access, and protect their critical business data from cybercriminals. We also help them move or expand their offices. We support the needs of our East Bay customers including businesses located in Concord, Martinez, Walnut Creek, Lafayette, Moraga, Orinda, and Pleasant Hill.