Usherwood Blog

Stay informed with updates and tips from our experts in the managed IT industry and hear the latest news about our team at Usherwood.

managed IT Services | Cyber Security

Small businesses are targeted now more than ever by hackers. One of the most common ways cybercriminals can gain access to your network or sensitive data is through employee emails. As technology has become more advanced, so have cybercrime tactics. With the use of AI and social media, hackers often have everything they need to impersonate business leaders or loved ones to manipulate people into revealing sensitive information. To mitigate the risk of these sneaky email scams, here are a few tips on email security training for employees.

Cyber Security

There’s nothing scarier than the thought your business could suffer a cyber-attack. October is Cybersecurity Month, created to spread awareness about cybercrime, cyber-attack detection and remediation, and cybersecurity best practices. Here are a few cases where hackers were unfortunately able to gain access to sensitive assets via malware and other tricks.

Cyber Security

Cybercriminals are targeting businesses now more than ever, especially since businesses have so much to lose regarding data and financial information. Unlike individuals, companies have more resources to steal. They also experience more liability since there are often multiple users on business networks. Users can make mistakes because of social engineering designed to mimic real messages, pop-ups, phone calls, and more.

Cyber Security

AI is currently a hot buzzword in the tech industry, and for good reason. It can provide astounding productivity and precision in your note-taking, correspondence, content creation and more. However, cybercriminals are finding new ways to use AI to develop sophisticated scams and ransomware schemes. Here are the basics of AI and how it can threaten your business’s cybersecurity.

Managed Print | Cyber Security | printer security

If you’re trying to improve your cybersecurity strategy, ensure you don't overlook your printers. They're often glossed over when business leaders address cybersecurity. This makes them attractive targets for cybercriminals. Businesses should consider printers a vulnerable endpoint of their business network. If you don't, you could risk your business for cyber attacks.

Managed Print | Cyber Security | HP

HP is a leading print manufacturer in endpoint security. Their printers offer a unique set of security features, and some of which are even exclusive to the brand. With hackers finding new ways to target businesses, experts warn that digital printers may be a vulnerable endpoint for malicious cyber-attacks.

Usherwood | Cyber Security

On Thursday, October 5th, Usherwood partnered with Huntress to present a cybersecurity webinar addressing the growing business of cybercrime. Ethan Tancredi from Huntress spoke about how hackers are making money using the unique underground market for cybercrime and malware as a service.

Cyber Security

As cybersecurity becomes a necessity for every business, there are many different approaches to choose from. So, what areas of your business do you need to focus on the most for cybersecurity? What tools and strategies are best for remote work? With phrases like “Zero Trust”, “shadow IT” being tossed around, you may wonder: what’s the difference between zero trust vs VPN?

Cyber Security

By: Dan Smith
September 27th, 2023

It might be tough to keep track of all the different terms for cyber scams these days. First “phishing” was the term for email scams impersonating companies and other entities in attempts to gain personal information. Now, terms like vishing, smishing, pharming and even quishing are being thrown around. Here’s an overview of what they all mean.

Cyber Security

By: Jada Sterling, Digital Content Manager
September 25th, 2023

If your small to medium-sized healthcare clinic uses digital records, odds are you may be at risk for data breaches. HIPAA compliance is a priority for any business in healthcare. To protect sensitive data, you'll need to understand the risks of data breaches, types of breaches, and vulnerabilities that lead to them.