Blog

CO-MANAGED IT: WHY IT MAKES SENSE TO WORK TOGETHER

If your organization has an internal IT resource, then you might think that working with an outsourced managed services provider might be redundant or unnecessary. While few would blame you for thinking that, you’d still be wrong. In this article we’re going to discuss co-managed IT, and the advantages it brings to any table. What […]

Co-Managed IT: Why It Makes Sense to Work Together

If your organization has an internal IT resource, then you might think that working with an outsourced managed services provider might be redundant or unnecessary. While few would blame you for thinking that, you’d still be wrong. In this article we’re going to discuss co-managed IT, and the advantages it brings to any table. What […]

Is Your IT Provider Really Supporting Your Business Growth?

Many organizations are comfortable with their current IT provider, but a lot of those same organizations likely haven’t taken the time to really investigate the value their provider is actually providing. In this article we’re going to discuss a few questions to ask and things to consider about the true role a good technology partner […]

IT Locomotion: The Importance of IT in an Office Relocation

Relocating is something that most businesses have to consider at some point in their lifespan. Perhaps a more suitable location has opened up, or perhaps the current location is having a negative impact on business, or perhaps your business needs more physical room to grow and expand—there could be any number of reasons to relocate […]

You Need a Trusted IT Resource to Rapidly Adjust For Remote Working Environments

The coronavirus (COVID-19) outbreak is causing businesses around the world to reexamine their operational structure. Companies now need to plan and prepare for employees to work remotely without any interruption to normal business functions, if they plan to stay competitive and productive. If you find you and your company are facing these decisions, Seltek will […]

Be Smart and Protect Your Data!

Be Smart and Protect Your Data! By Patrick Logan, President of Seltek The need to have a secure data backup has never been more critical to businesses, especially for smaller, more vulnerable organizations. Data can be compromised in many ways including cyber-attacks, accidental loss or deletion, bugs, security breaches, or hardware failures. We advise taking […]

Be more secure…use Two-Factor Authentication

What is Two-Factor Authentication? by Oscar Luna, IT Support Specialist In today’s digital age, it is important to implement a layered security strategy, both personally and professionally. Two-factor authentication is an easy, secondary method of securing accounts. Normally users have a username and password, which is Single-Factor authentication. Enabling Two-factor authentication or 2FA, provides a […]

What Is Cyber Liability Insurance?

Written by Kara Mueller, IT Support Specialist, Certified Computer Examiner WHAT IS CYBER LIABILITY INSURANCE? Cyber liability insurance covers liability and financial losses that result from data breaches and other cyber events. It can cover legal fees, notifying customers about a data breach, restoring personal identities of affected customers, recovering compromised data and repairing damaged systems. […]

Electronic Pickpocketing

Written by James Overby, Seltek Helpdesk Intern What is “Electronic Pickpocketing” and how does it happen? “Electronic pickpocketing,” also known as “Digital Pickpocketing, “ is a process in which a target’s credit card information is stolen in a public setting using RFID (Radio-frequency identification) wireless technologies. This type of theft can happen when getting gas, […]

Juice Hacking: Hacking in Plain Sight

What is “Juice Jacking”? Written by James Overby, Seltek IT Intern “Juice Jacking,” also known as “Juice Filming,” is a type of cyber-attack introduced within the past 5 years, involving cell phone chargers that serve as a data connection for hackers. These attacks typically happen over USB and involve installing malware to devices or copying […]