If your organization has an internal IT resource, then you might think that working with an outsourced managed services provider might be redundant or unnecessary. While few would blame you for thinking that, you’d still be wrong. In this article we’re going to discuss co-managed IT, and the advantages it brings to any table. What […]
If your organization has an internal IT resource, then you might think that working with an outsourced managed services provider might be redundant or unnecessary. While few would blame you for thinking that, you’d still be wrong. In this article we’re going to discuss co-managed IT, and the advantages it brings to any table. What […]
Many organizations are comfortable with their current IT provider, but a lot of those same organizations likely haven’t taken the time to really investigate the value their provider is actually providing. In this article we’re going to discuss a few questions to ask and things to consider about the true role a good technology partner […]
Relocating is something that most businesses have to consider at some point in their lifespan. Perhaps a more suitable location has opened up, or perhaps the current location is having a negative impact on business, or perhaps your business needs more physical room to grow and expand—there could be any number of reasons to relocate […]
The coronavirus (COVID-19) outbreak is causing businesses around the world to reexamine their operational structure. Companies now need to plan and prepare for employees to work remotely without any interruption to normal business functions, if they plan to stay competitive and productive. If you find you and your company are facing these decisions, Seltek will […]
Be Smart and Protect Your Data! By Patrick Logan, President of Seltek The need to have a secure data backup has never been more critical to businesses, especially for smaller, more vulnerable organizations. Data can be compromised in many ways including cyber-attacks, accidental loss or deletion, bugs, security breaches, or hardware failures. We advise taking […]
What is Two-Factor Authentication? by Oscar Luna, IT Support Specialist In today’s digital age, it is important to implement a layered security strategy, both personally and professionally. Two-factor authentication is an easy, secondary method of securing accounts. Normally users have a username and password, which is Single-Factor authentication. Enabling Two-factor authentication or 2FA, provides a […]
Written by Kara Mueller, IT Support Specialist, Certified Computer Examiner WHAT IS CYBER LIABILITY INSURANCE? Cyber liability insurance covers liability and financial losses that result from data breaches and other cyber events. It can cover legal fees, notifying customers about a data breach, restoring personal identities of affected customers, recovering compromised data and repairing damaged systems. […]
Written by James Overby, Seltek Helpdesk Intern What is “Electronic Pickpocketing” and how does it happen? “Electronic pickpocketing,” also known as “Digital Pickpocketing, “ is a process in which a target’s credit card information is stolen in a public setting using RFID (Radio-frequency identification) wireless technologies. This type of theft can happen when getting gas, […]
What is “Juice Jacking”? Written by James Overby, Seltek IT Intern “Juice Jacking,” also known as “Juice Filming,” is a type of cyber-attack introduced within the past 5 years, involving cell phone chargers that serve as a data connection for hackers. These attacks typically happen over USB and involve installing malware to devices or copying […]