Business Solutions & Software Group Blog

Business Solutions & Software Group Blog

Business Solutions & Software Group has been serving the Coral Springs area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How To (and How Not to) Handle Ransomware

How To (and How Not to) Handle Ransomware

From individuals all the way up to companies and governments, ransomware has been causing no small amount of stress for some years now. Let’s take a few moments to discuss this threat, what you can do about it, and how seriously the government is taking ransomware.

0 Comments
Continue reading

If a Hacker Uses Display Name Spoofing, They Might Look Trustworthy

If a Hacker Uses Display Name Spoofing, They Might Look Trustworthy

Business success is often tied to the quality of your business relationships, and there are many people you need to trust: suppliers who can provide you with everything you need, the team who do their jobs, and customers who turn to you because they know they need you. Unfortunately, it is possible for cybercriminals to exploit this trust to achieve their own goals.

0 Comments
Continue reading

Cybercrime Leading to Huge Business Losses

Cybercrime Leading to Huge Business Losses

This year, the main focus for business owners has been how to conduct business with a global COVID-19 pandemic. The public health crisis has created opportunities for scammers and hackers, and they’ve responded. One could say that there is a flourishing cybercrime pandemic as the past twelve months has seen a 50 percent increase in lost revenue over the second-highest period on record. Let’s take a look at COVID-19-era cybercrime and how it’s just getting worse as the pandemic rages on.

0 Comments
Continue reading

How to Provide Your Healthcare Practice’s Guests with Wi-Fi Access

How to Provide Your Healthcare Practice’s Guests with Wi-Fi Access

Regardless of how long they stay in a medical facility, patients and their visitors now expect that they will have access to wireless Internet during their time there. While it was once just a convenience, it is now an essential part of ensuring that they remain comfortable. As such, it is now the responsibility of the healthcare facility to ensure that their Wi-Fi is fast, reliable, and accessible.

0 Comments
Continue reading

Zoom is Really Working On Improving Security

Zoom is Really Working On Improving Security

Zoom is a video conferencing application that, as the coronavirus pandemic reared its ugly head, saw a considerable leap in popularity amongst organizations of every kind as well as private users. However, this leap also helped bring some serious security issues with the platform to light. Let’s check in and see how Zoom has since worked to improve their user protections.

0 Comments
Continue reading

Tip of the Week: Identifying a Phishing Message Before You’re Hooked

Tip of the Week: Identifying a Phishing Message Before You’re Hooked

Phishing attacks are a fashionable strategy for many cybercriminals and have been for some time. From the infamous Nigerian Prince email scam to the generic urgent message from the bank, most people have seen at least one example of phishing hit their inbox.

0 Comments
Continue reading

What Makes CAPTCHA So Complex (and Consistently Chafing)?

What Makes CAPTCHA So Complex (and Consistently Chafing)?

“To confirm you’re a human being, select all of the images that include traffic signals.”

Chances are good that you’ve seen such a requirement before as you’ve spent time online, whether you were filling out a form or logging into a website. Whether it was an evaluation like the one above, or simply one where you needed to identify a highly distorted series of alphanumeric characters, you probably have also noticed these tests getting more difficult as time has passed. The reason for this is simple: computers are getting better at beating them.

0 Comments
Continue reading

Keys to Warding off 2020’s Cyberthreats

Keys to Warding off 2020’s Cyberthreats

There are a lot of cyberthreats out there… too many for the modern business to avoid them all. While employing best practices may greatly reduce your chances of being breached and having data stolen from your network, they can also help you determine how a breach occurred and how your data was stolen. While there is no such thing as perfect cybersecurity, there are a few strategies you can lean on to strengthen yours.

0 Comments
Continue reading

How Can We Secure Our Use of Smart Assistants?

How Can We Secure Our Use of Smart Assistants?

Smart assistants are one of the most intriguing and confounding technologies developed over the past decade. At the time of this writing, over 150 million smart speakers are in 60 million homes in the United States, when you add in the smart assistants available on mobile devices and other various smart devices, you’re talking a billion people actively using some type of smart assistant. Over the past couple of years, you’re beginning to see these assistants being used more for business and this has made certain security-minded people a little weary of them. Let’s take a look at some of the security questions surrounding the smart assistants.

0 Comments
Continue reading

Do You Know What a Strong Password Looks Like?

Do You Know What a Strong Password Looks Like?

For the past twenty years, the password has been the most important security tool that individuals and businesses have to keep outside parties out of their personal and professional information. This may not always be the case, but much of a business’ security is built around the idea that passwords are keeping unwanted entities out. It is important that you and your staff understand what good password hygiene looks like. Today, we’ll outline what it looks like.

0 Comments
Continue reading

Examining the State of Data Privacy

Examining the State of Data Privacy

As a consumer, how concerned are you about the care that businesses give to your data privacy. Very? You aren’t the only one. 87 percent of Americans see their data privacy as a human right.

0 Comments
Continue reading

Too Many Businesses are Still Using Windows 7

Too Many Businesses are Still Using Windows 7

Windows 7 was once the best operating system ever made by leaps and bounds. Now, it’s unsupported and shouldn’t be found on any Internet-connected device. Unfortunately, this isn’t the truth as millions of people are still using Windows 7 for their businesses. Today, we will take a look at why Windows 7 is dangerous and what options businesses have to upgrade away from the unsupported OS.

0 Comments
Continue reading

What’s it Going to Take? Cybersecurity

What’s it Going to Take? Cybersecurity

The COVID-19 pandemic has changed the way that a lot of businesses are approaching cybersecurity. In normal times, businesses will periodically try to make improvements to their organizational security and pounce all over events that could put their network and data at risk. While this strategy has worked, the new normal brought on by COVID-19 has IT administrators and business decision makers focused on maintaining resilience regardless of the financial and operational stressors they encounter. In today’s article we will look to identify the major shifts businesses have had to make, and how a consistent approach to cybersecurity is giving some companies an advantage.

0 Comments
Continue reading

Are You and Your Team Prepared to Deal with Phishing?

Are You and Your Team Prepared to Deal with Phishing?

One of the most prevalent problems that businesses now face are scams known as phishing attacks. When it comes to defending against these attacks, the capability to identify phishing as such is perhaps your greatest asset. Let’s go over a few signs that a message you receive might be a phishing attack.

0 Comments
Continue reading

Did Google and Apple Secretly Install a COVID-19 Tracking App?

Did Google and Apple Secretly Install a COVID-19 Tracking App?

In a recent security update, most Android and iOS phones received a new opt-in setting related to the COVID-19 Exposure Notification system. What is this? Is your phone being tracked? Let’s take a deeper look at what is going on.

0 Comments
Continue reading

Macs Are Not Immune to Cybersecurity Threats

Macs Are Not Immune to Cybersecurity Threats

It’s a common myth that Apple computers don’t get viruses. It’s not uncommon for a Mac user to chime in and say, “you should have gotten a Mac,” when a PC user mentions getting a virus or malware. 

Let’s unpack this myth, and talk a little about how, no matter what technology you have, you need to protect it.

0 Comments
Continue reading

Not All Cybersecurity Efforts Work to Keep You Secure

Not All Cybersecurity Efforts Work to Keep You Secure

There are many security buzzwords that come into play when the technology available to help secure a business is discussed. The problem is that many of these buzzwords sound great but are actually very poor fits to the real needs of most small and medium-sized businesses. Let’s consider how these buzzwords play into the concept of “security theater” and how this can impact businesses negatively.

0 Comments
Continue reading

How Secure is Your Data, Really?

How Secure is Your Data, Really?

Internet-based companies have access to an audience that, at the very least, are extremely trusting of them. There is an expectation that these businesses will fulfill their promises while also protecting the information that their customers and clients provide to them, but are these expectations well-founded? Let’s consider common collection practices companies deploy and how you can keep yourself safe.

0 Comments
Continue reading

Make IT Security a Priority for Your Business

Make IT Security a Priority for Your Business

With so many people working from home due to stay-at-home orders resulting from the COVID-19 pandemic, IT security may not be at the forefront of users’ minds. Unfortunately, scammers and hackers aren’t unemployed during this time and are still causing havoc for businesses of all sizes. Let’s take a look at cybersecurity during COVID-19.

0 Comments
Continue reading

Video Conferencing Security is Important

Video Conferencing Security is Important

Video conferencing has been one of the surprise winners of the COVID-19 era. As large percentages of people are asked to distance from others, one solution that has been extremely popular is to have meetings over the Internet. While seemingly the whole world is using video conferencing solutions, for the business, there are other considerations that have to be made. Today, we’ll hit on some strategies you can use to improve the security of your web conferences. 

0 Comments
Continue reading

About Business Solutions & Software Group

Business Solutions & Software Group has been serving the South Florida area since 1997, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

Business Solutions & Software Group is proud to announce the launch of our new website at www.bssgcorp.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact Us

10211 W Sample Road Suite 114
Coral Springs, Florida 33065

Mon to Fri 9:00am to 6:00pm

help@itcloud360.com

(954) 575-3992