Usherwood Blog

Stay informed with updates and tips from our experts in the managed IT industry and hear the latest news about our team at Usherwood.

managed IT Services | Cyber Security

By: Sarah Goltz, Content Manager
August 24th, 2022

Update: The Federal Trade Commission has extended the deadline of their Safeguards Rule that applies to auto dealerships from December 9th, 2022 to June 9th 2023, the article below reflects this update.

Cyber Security

By: Darrian Breedlove, Content Writer
June 17th, 2022

Ransomware victims can vary from large global companies to small businesses. Every business should take measures to learn what ransomware attacks are and how they can best be avoided.

managed IT Services | Cyber Security

By: Sarah Goltz, Content Manager
May 25th, 2022

As a business, it is essential to stay up to date on all the latest tactics used by hackers to gain access to confidential information. As a managed IT provider, we work with many businesses to help their employees understand and avoid phishing attacks.

Cyber Security

By: Sarah Goltz, Content Manager
February 14th, 2022

As technology becomes more advanced, cyber hackers are utilizing new tactics to infiltrate your network. It seems like every day there is a new headline about a business dealing with the consequences of a new cyber threat.

Cyber Security

By: Sarah Goltz, Content Manager
January 27th, 2022

When you think about hacking and who is typically the target, it is often associated with large corporations. It’s not likely you’ve seen many movies involving a big heist going for the small mom and pop store.

Cyber Security

By: Darrian Breedlove, Content Writer
January 26th, 2022

When it comes to cyberattacks, insider threats are commonly overlooked. Hazards are not only caused by external parties trying to get into your network. Many threats are coming directly within your own company. According to statistics from Goldstein, 60% of data breaches are caused by insider threats. For this reason, we at Usherwood have developed some of the best tools and processes to mitigate cyber-attacks caused by internal sources.

Cyber Security

By: Sarah Goltz, Content Manager
January 14th, 2022

A severe flaw found within a software framework known as “Log4j” has recently put hundreds of millions of users at risk. The issue carries a severity rating of 10 on the Common Vulnerability Scoring System scale, the highest rating on the scale.

managed IT Services | Cyber Security

By: Sarah Goltz, Content Manager
January 7th, 2022

Many businesses are receiving penetration tests today, and you might wonder why. What kind of benefits will a penetration test provide your business? Is it worth it? As a managed service provider, we often recommend that clients receive penetration tests in addition to managed IT support.

Managed Print | Cyber Security

By: Sarah Goltz, Content Manager
December 17th, 2021

Can you really rob a bank with a printer? Yes. It isn’t easy, but it did happen..more than once…and it could happen again because the perpetrators are still up to no good, and they’re outside the reach of conventional law enforcement.