Message Regarding the COVID-19 (Coronavirus) | Find Out More 

Home

About Us

IT Services

Understanding IT

News

Blog

Contact Us

Client Support Center

Dresner Group Blog

Dresner Group has been serving the Columbia area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Five Steps to Better Basic Cybersecurity

Five Steps to Better Basic Cybersecurity

Cybersecurity needs to be one of any business’ primary considerations. More than it ever has been before, cybersecurity is one of the biggest day-to-day issues that a business needs to deal with; and, this need is only exacerbated by the shortage of cybersecurity talent and loyalty to outdated security strategies have put many businesses in an unenviable, and vulnerable, position.

0 Comments
Continue reading

Setting Up Your Company’s Wireless System Should Be More Involved than Just Plugging in a Router

Setting Up Your Company’s Wireless System Should Be More Involved than Just Plugging in a Router

We live in a world that is constantly connected, be it through a wireless connection or through your smartphone’s mobile data. This makes it especially important to practice appropriate cybersecurity practices while you’re connected to a wireless network. Let’s go over some wireless cybersecurity best practices you can keep in mind when using your wireless technology.

0 Comments
Continue reading

Cybersecurity Has to Be a Consideration for Remote Workers

Cybersecurity Has to Be a Consideration for Remote Workers

With many people choosing to work remotely, and businesses more or less embracing the idea of employing mobile teams, the tools and strategies needed to keep your business’ data and infrastructure safe could be new to your business, but for the most part many of them are actions that any organization looking to secure their IT would take. Let’s take a look at some of the strategies used to secure remote endpoints.

0 Comments
Continue reading

Baltimore Nonprofits are a Prime Target for Cyberattacks

Baltimore Nonprofits are a Prime Target for Cyberattacks

It’s easy to think of a data breach as something that only happens to massive companies like Netflix, Target, and Equifax. The reality is that, more often than not, small and medium-sized businesses are the target of cyberattacks, which makes the nonprofit sector a prime target as well. Here are three ways to protect your nonprofit from a bad actor.

0 Comments
Continue reading

Are Chrome’s Zero-Day Threats Actually a Good Thing?

Are Chrome’s Zero-Day Threats Actually a Good Thing?

With Google Chrome being one of the most popular web browsers out there, it’s no surprise that threats want to target it and take advantage of its users. However, up until recently, there have not been very many zero-day threats associated with Chrome. Zero-day threats are attacks that have never been seen before, affecting a new and previously unknown vulnerability. We want to remind you that it’s not always a bad thing when vulnerabilities are discovered in a browser or web application—in fact, it can actually be indicative of good monitoring practices.

0 Comments
Continue reading

Businesses Should Consider Partnering with a Security Operations Center (SOC)

Businesses Should Consider Partnering with a Security Operations Center (SOC)

Cybersecurity is incredibly important for any organization that requires IT to remain operational (basically all of them), so it’s time to start thinking about your own strategies and how you can keep threats out of your network. One viable solution your business can implement is a Security Operations Center (SOC). What is a SOC, and how can you use it to keep threats off your network?

0 Comments
Continue reading

How to Get Your People on Board with Your Security Strategy

How to Get Your People on Board with Your Security Strategy

It can be tough to get your staff to care about your business’ network security, especially if they don’t consider it part of their day-to-day tasks or responsibilities. However, network security is not just isolated to your IT department; it matters to everyone, and if you can convince your staff to adhere to best practices, your security will be that much more effective moving forward. Here are seven tips you can use to get your staff to care about network security.

0 Comments
Continue reading

Preparing for the Next Wave of Cyberthreats

Preparing for the Next Wave of Cyberthreats

The past couple of years have been difficult for businesses, regardless of if they are large organizations or small businesses. Likewise, cybersecurity has been a challenge. Let’s take a look at what 2022 could pose for cybersecurity, especially considering recent trends.

0 Comments
Continue reading

Cybersecurity is a Multifaceted and Strategic Issue for Small Businesses

Cybersecurity is a Multifaceted and Strategic Issue for Small Businesses

There are a lot of threats out on the Internet, and many of them have absolutely a slim chance to threaten your business. Unfortunately, there are plenty that can and it only takes one to set your business back. Many IT professionals currently working for enterprise businesses deal with threats day-in and day-out, so they are experienced and knowledgeable. Small business owners, who for all intents and purposes are the lead IT decision-makers, don’t always consider these risks; they just need to keep their business running effectively. 

0 Comments
Continue reading

Why IT Support and Physical Security Should Go Hand-In-Hand

Why IT Support and Physical Security Should Go Hand-In-Hand

We’ve recently joined forces with Visual Security to help bring security cameras and physical security solutions to our clients. You might be thinking, “Why would I rely on the company that keeps my computers and technology running to establish my surveillance system?”

As it turns out, IT security and physical security go hand-in-hand.

0 Comments
Continue reading

Network Security Cannot Be Ignored

Network Security Cannot Be Ignored

You see the headlines every single day while browsing the Internet: “So-and-So Suffers Massive Data Breach” or “Huge Data Breach Leaves Thousands of Credentials Exposed to Hackers.” Maybe you don’t see these specific headlines, but you get the idea; cybersecurity is a big deal these days, and you need to take it seriously before your business encounters problems that it cannot recover from.

0 Comments
Continue reading

In the Wrong Hands, AI is Dangerous

In the Wrong Hands, AI is Dangerous

Artificial intelligence, or AI, is a technology that many industries have found themselves benefiting greatly from, especially in the domains of cybersecurity and automation. Unfortunately, for every one great use of something, hackers will find two bad uses for it. AI has dramatically changed the landscape of cybersecurity and, more interestingly, cybercrime. Let’s take a look at why these threats are so concerning.

0 Comments
Continue reading

Companies Are Using AI to Shield Their Network from Outside Threats

Companies Are Using AI to Shield Their Network from Outside Threats

Businesses need all of the advantages they can get against threats, especially considering the fact that many of them adapt and evolve in response to advances in security measures. Some security researchers are seeing great success with artificial intelligence measures, a concept that could eventually become the future of network security in the business world.

0 Comments
Continue reading

How Often Should You Train Your Team on Cybersecurity?

How Often Should You Train Your Team on Cybersecurity?

Cybersecurity is an important part of running a business, especially in today’s age of ransomware and other high-profile hacks. It stands to reason that you periodically assess how effective your security practices are and how well-prepared your team is to respond to threats, but how often should you do so? Let’s take a closer look.

0 Comments
Continue reading

It May Be Time to Upgrade Your Remote Network Security

It May Be Time to Upgrade Your Remote Network Security

Today’s cybersecurity landscape is dangerous, to say the least, prompting many organizations to adopt what is called a zero-trust policy for their security standards. Is a zero-trust policy the best solution for your company’s cybersecurity woes, and how effective is it toward preventing security issues? Let’s take a look.

0 Comments
Continue reading

Maryland’s Historic Agricultural Industry is Under Attack

Maryland’s Historic Agricultural Industry is Under Attack

Ransomware, and more specifically those who maliciously deploy and spread it, are shamelessly tactical in the industries targeted in their campaigns. Let’s examine how Maryland’s agricultural industry is at great risk of a malware attack, and why this is.

0 Comments
Continue reading

4 IT Errors Every Small Business Needs to Avoid

4 IT Errors Every Small Business Needs to Avoid

Technology is often a source of struggle for small businesses, usually for one of two reasons. Either the strong IT leadership needed isn’t there, or there aren’t enough resources to support the level of IT management and maintenance that businesses need. Of course, there are other mistakes that can easily be made when it comes to a business’ technology management.

0 Comments
Continue reading

These Are the Most Likely Threats Your Small Business Will Face

These Are the Most Likely Threats Your Small Business Will Face

Data breaches are a well-known fact in the business environment, and small businesses in particular have many challenges that threaten their operations. It is important that you consider these security issues when putting together your risk management strategy, especially as it pertains to cybersecurity. Let’s take a look at how you can overcome some of the security challenges present for small businesses in 2021.

0 Comments
Continue reading

Why 2FA is Worth the Hassle

Why 2FA is Worth the Hassle

Cybersecurity has become front and center due to a rash of ransomware attacks hitting businesses, and more and more high-profile attacks happening every year. Despite the understandable concern, your business doesn't have to be a victim. By enabling 2FA, you can significantly reduce your exposure. Unfortunately, many companies feel that 2FA is too much of a hassle to implement and opt out. If you think this way, give us five minutes to convince you why 2FA is worth it.

0 Comments
Continue reading

Protect Your Business Against These Common Security Threats

Protect Your Business Against These Common Security Threats

If anything has been made clear by recent strings of high-profile ransomware attacks, it is that businesses and organizations simply do not take security as seriously as they need to. We urge you to use this opportunity to reconsider your own levels of network security. Are you doing all that you can to keep your data and assets secure? There are countless threats out there, and they all must be addressed (or at least prepared for) in some way.

0 Comments
Continue reading

Contact Us

Learn more about what Dresner Group
can do for your business.

410-531-6727

Dresner Group
5950 Symphony Woods Road Suite 302
Columbia, Maryland 21044

Client Service Login