The Blog

Have I Been Hacked?

No matter how secure you are, sooner or later you may have an accident and become hacked. Below are clues you might have been hacked and if so, what to do. Your Online Accounts Family or friends say they are receiving unusual messages or invites from you that you know...

COVID-19 and the Local Government IT Response

Information technology professionals serving local governments of all sizes have been called upon to help maintain the delivery of essential programs by enabling remote work, sometimes for staff who had never worked from home, and managing all the logistical and...

BPI Earns Respected Technology Industry Credential

BPI Earns Respected Technology Industry Credential CompTIA Managed Services Trustmark™ signifies commitment to industry best practices.   BPI Information Systems has received the CompTIA Managed Services Trustmark™, a respected industry credential that signifies...

Office 365 Tips: How to Password Protect an Excel Workbook

Password protection at the file level is an important step to protecting confidential and proprietary data. Password protecting an Excel workbook at the file level controls access in two ways: It lets a user in, and it lets a user save changes. To get started, open...

Blueprints for Building a Robust Incident Response Plan

While a lot of energy is put it into avoiding security breaches, they still happen. A solid incident response plan can limit damage, reduce recovery time and contain the associated costs. Most IT Departments are firmly focused on prevention. We build systems and adopt...

21 Tops Tips for Securing Your Business in 2021

Securing your IT environment and bringing in the right tools to ensure that it’s being protected safeguards your business, not just technology. Start 2021 with these top tips. 1 Enable MultiFactor Authentication on your accounts. 2 Start a user security awareness...

Hacking Around the Holidays

The holidays increase your organization’s exposure to cyber risk: Reduced staff — December is the month of cookies, hot chocolate, and half your workforce going on vacation. Interim employees, remote workers, and reduced staff across the board. Email avalanche — The...

Vishing: Identify, Detect, and Stop Phone Scams

Phone scams, where a person or a computer calls you up and tries to trick you into saying, buying or doing something, are increasingly prevalent cybercrime. We’ve certainly had our fair share of them recently, receiving several fake calls a day. What we have noticed...

Holiday Phishes

Fraud is on the rise. You can help prevent it. The safety and security of your organization’s data and networks remains our highest priority. We work 24/7 to protect your business and inform you of security changes. As part of our commitment, it’s important to know...

Website design by Sun & Soil Design | Privacy Policy