Home

About Us

IT Services

Understanding IT

News

Blog

Contact Us

Client Support Center

Dresner Group Blog

Dresner Group has been serving the Columbia area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Have You Kept Up with Your Security Audits? You Need To, Especially Now!

Have You Kept Up with Your Security Audits? You Need To, Especially Now!

When a business undergoes a security audit, its IT security is evaluated to make sure that it has the proper protections in place to protect against the various threats that could strike. Now more than ever, it is important for any organization to be confident in their preparedness. Let’s discuss the importance of assessing your own organization’s security with audits, and how this benefits you.

0 Comments
Continue reading

PCI Compliance 101

PCI Compliance 101

Does your business accept credit cards? Of course it does. Regardless of what industry you are in, your customers are now using payment cards for a large portion of their retail transactions both online and in-store. To protect consumers, there has been a compliance standard enacted by credit card companies. Today we will look at this standard.

0 Comments
Continue reading

ALERT: Maryland Small Businesses Being Targeted by Phishing Attacks

ALERT: Maryland Small Businesses Being Targeted by Phishing Attacks

Being a small business doesn’t make you invisible to criminals on the Internet. You might think that being a smaller entity, serving only a local area, might not drive a lot of malicious attention to you, but it just isn’t the case today.

We have been observing a significant rise in reported phishing attacks from clients, prospects, and local businesses throughout Maryland. In fact, we’re not just seeing this happen in the larger cities, but the smaller, more rural areas as well.

Continue reading

Why You Need to Keep an Eye on Your Data

Why You Need to Keep an Eye on Your Data

When a company operates primarily via the Internet, there seems to be an inherent trust that their audience naturally has. There’s little-to-no doubt that all promises will be kept and that all data shared with them will be fully secured, but is this confidence appropriately placed? While we can’t speak to the promises these companies make, we can weigh in on some common data security practices.

0 Comments
Continue reading

Don’t Let Scammers Scare You with COVID-19

Don’t Let Scammers Scare You with COVID-19

The COVID-19 pandemic has resulted in a great number of people working from home. While this is good for the public health, it may unfortunately lead your employees toward a laxer view of cybersecurity. Cybercriminals are sure to take advantage of this if you aren’t careful, so it is important to be particularly aware of your cybersecurity right now.

0 Comments
Continue reading

Is Your Business Being Attacked From the Inside?

Is Your Business Being Attacked From the Inside?

With cyberthreats the way that they are, a lot of industry professionals go on and on about the importance of deploying technologies designed to reduce the potential threats that a business has to confront. This technology isn’t cheap and while they absolutely do help you protect your technology and data; today’s hackers know that. Unfortunately for small business owners, that shift has left your staff on the front lines of cybersecurity; a place they really shouldn’t be. Let’s discuss cybersecurity from an employer’s perspective.

0 Comments
Continue reading

Three Facets of Security to Focus On

Three Facets of Security to Focus On

When it comes to a business’ cybersecurity, there is no magic bullet to solve every problem. No miracle cure, no panacea, no Staples “that was easy” button. Instead, you need to deploy various means of protecting your operations. Let’s discuss how your business’ security needs to be shaped in three different environments: your physical infrastructure, your cybersecurity solutions, and your employees’ security habits.

0 Comments
Continue reading

How to Safely Use Wireless Internet to Work from Home

How to Safely Use Wireless Internet to Work from Home

While remote work has gained an understandable boost in popularity, many business owners and technology specialists may still be concerned about how secure the Wi-Fi connections that workers are using in the home are. To waylay those fears, you need to be sure that your employees are using their networks as securely as they can.

0 Comments
Continue reading

Hackers Double Down During Crisis

Hackers Double Down During Crisis

The COVID-19 pandemic has most of the world at home. It has completely disrupted everyday life and has businesses scrapping their normal strategies for work-at-home policies that will at least allow them to maintain some productivity. These strategies, while highly effective, carry with them additional risk. Today, we take a look at some of the risks associated with relying on remote workers.

0 Comments
Continue reading

Four Security Tips Your Entire Staff Should Know

Four Security Tips Your Entire Staff Should Know

While investing in cybersecurity solutions like firewalls, backup, and monitoring are essential to protecting your data from being compromised, focusing solely on technology is only half the battle. The greatest vulnerability will always be the employee. In order to protect your data, you need to give your employees the training to protect themselves. After all, when it comes to network security, your team is your critical asset. Here are four security lessons your team needs to know.

Continue reading

Coronavirus: A Threat to Your Staff, Cyberthreat to Your Operations

Coronavirus: A Threat to Your Staff, Cyberthreat to Your Operations

COVID-19, or coronavirus, has been a major global health concern over the past couple of months. At this point, it is clear that this disease could have serious impacts on the workplace. We wanted to provide a brief rundown of good workplace and network health practices, as well as a few pointers on how you can handle health-based employee absences.

0 Comments
Continue reading

Social Engineering Isn’t Going Away

Social Engineering Isn’t Going Away

When someone starts talking about social engineering, people often get confused. They think we’re talking about cloning. While having two of something you love may not be terrible, the social engineering we routinely cite is much, much worse. Social engineering is the act of using social interactions to get people to make cybersecurity mistakes. Today, we’ll take a look at social engineering and how it can have a negative effect on your business. 

0 Comments
Continue reading

Why It’s Paramount to Keep Security in Mind

Why It’s Paramount to Keep Security in Mind

Over the last few years, there has been a meteoric rise in cybercrime, with nothing to indicate that rates will decrease anytime soon. Why would they? Bad actors and cybercriminals can make a pretty penny by attacking businesses, and they are only becoming more equipped and experienced in doing so. 

0 Comments
Continue reading

The Three Key Steps to Stop Malware

The Three Key Steps to Stop Malware

Malware is a bad thing. It’s right there in the name, as the prefix mal- comes from the Latin malus, which literally translates to “bad.” So, it only makes sense to try to keep it out of your business. Let’s discuss a few basics to form the foundation of your greater cybersecurity strategy.

0 Comments
Continue reading

Windows 7 Has Nearly Ticked Its Last Tock

Windows 7 Has Nearly Ticked Its Last Tock

It won’t be long before Microsoft retires two of its most popular operating systems - but hopefully, you already knew that. Microsoft has made a point of reminding Windows 7 users that they need to upgrade before January 14 - and yet, many users haven’t done so.

0 Comments
Continue reading

Facebook and Your Privacy (Part 2)

Facebook and Your Privacy (Part 2)

Wait! If you haven’t read part one of our Facebook privacy blog yet, you may want to do that before reading this one. If you’re ready, we’ll be taking an in-depth look at your Facebook settings to make sure that your account and its data are as secure as possible. If we’re being honest, protecting this kind of data hasn’t seemed to be one of the platform’s strong suits - and user privacy has been the star of many lists of concern.

0 Comments
Continue reading

Facebook and Your Privacy (Part 1)

Facebook and Your Privacy (Part 1)

Two billion users strong, Facebook is one of the Internet’s most popular websites… which has frequently put the tech giant in the spotlight when it comes to how secure the data you’ve entrusted to them (in addition to what they’ve collected) really is. Today, we’ll discuss how you can access the information Facebook has on you.

0 Comments
Continue reading

Recent Data Breaches You Should Know

Recent Data Breaches You Should Know

Imagine for a second what would happen if your business’ data was exposed and stolen. You’d have a really difficult time going forward as your client-base dwindled and you opportunities for growth dried up. The amazing part is that some very successful companies have this type of thing happens all the time. Today, we will look at some of the largest data breaches since September 1.

0 Comments
Continue reading

Protect Smartphones Like Any Other Computer

Protect Smartphones Like Any Other Computer

We go into great depth on how to protect your desktop and laptop computers from malware and other malicious threats. In fact, one of the first steps you take anytime you are setting up a new computer is to install antivirus and other security programs. You do this because an unprotected device presents substantial risk. With the way people are using their smartphones today, it’s a solid practice to outfit your mobile device with the security software needed to maintain the security of your data.

0 Comments
Continue reading

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Antivirus developer Trend Micro is doing some damage control after an ex-employee stole customer data and sold it to online scammers. These scammers have been calling Trend Micro customers. If you use Trend Micro, it’s best to be wary of any calls you get.

0 Comments
Continue reading

Contact Us

Learn more about what Dresner Group
can do for your business.

410-531-6727

Dresner Group
5950 Symphony Woods Road Suite 302
Columbia, Maryland 21044

Client Service Login