Dangerous New Attack Techniques & How to Counter Them

RSA Conference 2019 addressed the most dangerous attack techniques facing organizations and individuals today. There are two specific attack vectors that are increasing. First is the manipulation of the DNS infrastructure associated with specific enterprises. Hackers are using credentials that they have compromised in the normal course of business. Bad guys are logging into DNS […]

Dangerous New Attack Techniques & How to Counter Them Read More »

international womens day 2019

International Women’s Day Helps to Launch Initiatives

Programs aim to support women and girls in STEM March 8th marks International Women’s Day, a day celebrating women’s achievements and gender equality. One industry where that would be welcome: technology. Women make up just 30 percent of the workforce in Silicon Valley, according to the Kapor Center, a nonprofit that supports women and people of color in

International Women’s Day Helps to Launch Initiatives Read More »

C-Forward Named as Top National Managed Service Provider

C-Forward Named as Top National Managed Service Provider

FOR IMMEDIATE RELEASE: 2/22/19 Dale Silver C-Forward 859-442-7877 dsilver@cforward.com   C-Forward Named as Top National Managed Service Provider (MSP) Also Celebrating our 20th year of IT Services Covington, KY: Local IT experts, C-Forward has been recognized as one of the Top 250 IT Companies in America by CRN.  This marks the fifth straight year that

C-Forward Named as Top National Managed Service Provider Read More »

cybersecurity 101 vol 5

Cybersecurity 101: How To Choose and Use An Encrypted Messaging App

Text messaging has been around since the dawn of cellular technology, and sparked its own unique language. But it’s time to put sending regular SMS messages out to pasture. If you have an iPhone, you’re already on your way. iPhones (as well as iPads and Macs) use iMessage to send messages between Apple devices. It’s

Cybersecurity 101: How To Choose and Use An Encrypted Messaging App Read More »

cybersecurity vol 4

Cybersecurity 101: How to Browse the Web Securely and Privately

So you want to browse the web securely and privately? Here’s a hard truth: it’s almost impossible. It’s not just your internet provider that knows which sites you visit, it’s also the government — and other governments! And when it’s not them, it’s social media sites, ad networks or apps tracking you across the web

Cybersecurity 101: How to Browse the Web Securely and Privately Read More »

In-House or Outsourced Information Technology?

In-House or Outsourced Information Technology? 7 Questions Owners and CEOs Should Consider

There is nothing better than having a great IT resource. It is a bonus if they are a long-term employee, handle everything you need, are there when you need them, and stay up-to-date on new technologies that continuously help your company’s productivity. For the other 80% of companies, you might consider an out-sourced, managed services

In-House or Outsourced Information Technology? 7 Questions Owners and CEOs Should Consider Read More »

Cybersecurity 101 two factor

Cybersecurity 101: Two-factor Authentication Saving You A World Of Trouble

If you find passwords annoying, you might not like two-factor authentication much. But security experts say it’s one of the best ways to protect your online accounts. Simply put, two-factor authentication adds a second step in your usual log-in process. Once you enter your username and password, you’ll be prompted to enter a code sent

Cybersecurity 101: Two-factor Authentication Saving You A World Of Trouble Read More »