Blog

Dresner Group Blog

Our technology blogs feature IT tips and best practices for businesses in Columbia, Baltimore, Bel Air and in and about Maryland since 2002.

Tip of the Week: Build Better Passwords

Tip of the Week: Build Better Passwords

The password is the number one data protection strategy used in computing. It’s strange, however, how many times a weak password is the cause of data breaches and other situations that can hurt a business. In today’s blog, we go through some of the best password creation tips that will allow you to better secure your individual and business data. 

0 Comments
Continue reading

Consumer-Grade Security Cameras are a Bad Investment for Baltimore Businesses

Consumer-Grade Security Cameras are a Bad Investment for Baltimore Businesses

When it comes to protecting your business, security cameras are a must-have. They provide a sense of security and can help deter potential criminals. However, not all security cameras are created equal. While consumer-grade security cameras may seem like a cost-effective option, they are not a wise investment for Baltimore businesses. There are several reasons why, and in this post, we are going to take a look at them.

0 Comments
Continue reading

Actions to Take When Your Phone Goes Missing

Actions to Take When Your Phone Goes Missing

If you are like many of the rest of us, the thought of losing your phone is a situation that brings on anger and fear. If your phone has been stolen, there are several steps you have to take to mitigate potential risks and increase the chances of recovering your device. Here's a general guide.

0 Comments
Continue reading

As Good as Your Reputation May Be, One Security Incident Can Bring It All Down

As Good as Your Reputation May Be, One Security Incident Can Bring It All Down

Small and medium-sized businesses largely rely on their standing amongst their audience, which means their reputations are critically important to preserve. Unsurprisingly, one of the fastest ways to damage—if not eliminate—their reputation amongst the public is to suffer a cybersecurity event. Let’s examine some statistics, and consider what you need to do to keep your business from becoming one.

0 Comments
Continue reading

6 of the Most Noteworthy Data Breaches from 2023

6 of the Most Noteworthy Data Breaches from 2023

Technology and digital tools are a hot topic on our blog, but where there is technology, there is also data… and where there is data, there will be hackers trying to steal it. Data breaches are a common thread in all industries, and to prove this, we have put together six of the most notable data breaches from 2023. We hope you can learn a thing or two from them!

0 Comments
Continue reading

Spot Dangerous Phishing Links by Examining the URL

Spot Dangerous Phishing Links by Examining the URL

In this blog, we continuously try to caution individuals against clicking on suspicious links, but distinguishing between a genuine URL and a questionable one has become increasingly challenging. Malicious tactics have evolved, making it imperative for everyone to remain vigilant. These threats are pervasive, coming from various directions. This discussion will focus on a single punctuation mark that can help determine whether a link is genuinely safe or potentially perilous.

0 Comments
Continue reading

Five Ways to Optimize Your Organization’s Password Management

Five Ways to Optimize Your Organization’s Password Management

Digital access relies on passwords as keys, but they are often neglected and left unprotected by users. Unfortunately, not everyone takes the necessary precautions to safeguard their passwords, and the prevalence of online scams surpasses that of physical pickpocketing.

Effective password management is imperative for businesses to uphold the security of online accounts and sensitive data. Here are five strategies to optimize password management:

0 Comments
Continue reading

The 5 C's of Cybersecurity to Protect Baltimore Business

The 5 C's of Cybersecurity to Protect Baltimore Business

Baltimore businesses are no strangers to the growing threat of cyberattacks, scams, and online threats that target businesses of all shapes and sizes. One thing is for certain, it is crucial for individuals and businesses to prioritize cybersecurity in order to protect their sensitive information. But with so many different aspects to consider, it can be overwhelming to know where to start. That's where the 5 C's of cybersecurity come in—a comprehensive approach to protecting your digital assets.

0 Comments
Continue reading

Four Ways to Boost Your Password Hygiene

Four Ways to Boost Your Password Hygiene

Securing accounts is part of a comprehensive security strategy, and it all begins with practicing proper password hygiene. Are you using strong, complex passwords that are going to keep your accounts safe? While we always recommend using multiple measures to protect accounts, starting with your passwords can be a good way to build up to this. Let’s go over how to use better passwords for all of your online accounts and business needs.

0 Comments
Continue reading

Six Steps to Safer Business Data

Six Steps to Safer Business Data

Ensuring the security of your data is extremely important. If you are a frequent reader of this blog, you know that any unauthorized access to sensitive information can result in severe consequences for your business. The problem is that today’s cybercriminal tactics have become increasingly sophisticated, posing a constant challenge to organizational data security. Today, we look at six things you can do to keep your data secure.

0 Comments
Continue reading

4 Ways We Can Help Your Business with Network Security

4 Ways We Can Help Your Business with Network Security

Security is a hot topic among businesses, especially where technology and data are concerned. If you want to ensure that you are doing all you can to protect the important assets and customer data on your infrastructure, you’ll want to work with a managed service provider who can offer all the services you need to make security a top priority. Here are just a few of them.

0 Comments
Continue reading

Planning Technology Isn’t Always Easy

Planning Technology Isn’t Always Easy

Planning anything is always a grind, and trying to plan the best strategy when you have only a partial understanding of the subject can lead to a lot of waste. Business technology is one of those subjects. Not only do you need to identify what tech will be cost-effective, you need to get a pretty rapid return on the investment you plan to make. That’s why getting a professional perspective is so important in cases like this. 

0 Comments
Continue reading

With Modern Cybersecurity, Awareness is Everything

With Modern Cybersecurity, Awareness is Everything

Every organization needs to have a certain level of cybersecurity protection in place. That includes firewalls, antivirus, VPNs, encryption, and centrally managed security policies. Even so, many modern cybercriminals know that businesses have these protections in place, and they are working out ways around them.

0 Comments
Continue reading

You Should Avoid Being Scammed, But There’s No Shame In It When It Happens

You Should Avoid Being Scammed, But There’s No Shame In It When It Happens

I recently engaged in a discussion with some of my colleagues about the intersection of cybersecurity and the scams that so many of us deal with every day, like those annoying phone scams. We wound up concluding that it's valuable to examine these phenomena together.

So, let’s do that.

0 Comments
Continue reading

Baltimore Nonprofits Should Prioritize Cybersecurity and Physical Security

Baltimore Nonprofits Should Prioritize Cybersecurity and Physical Security

Nonprofit organizations are often focused on their mission and the impact they have on the community. More than ever, it is crucial for nonprofits to prioritize cybersecurity and physical security to protect their sensitive data and maintain the trust of their donors and stakeholders.

In this article, we will discuss the importance of cybersecurity and physical security for nonprofit organizations and provide tips on how to prioritize and implement these measures.

0 Comments
Continue reading

15 Cybersecurity Tips for a Safer Office

15 Cybersecurity Tips for a Safer Office

Cybersecurity is critical for an organization, regardless of how big or small, and regardless of the industry you are in. We’ve put together 15 important cybersecurity tips that business owners and organization directors need to take to heart and adopt.

0 Comments
Continue reading

The VPN Is a Solid Tool for Data Security

The VPN Is a Solid Tool for Data Security

Nowadays, data security, especially on files that are attractive to hackers, has to be a priority. Many businesses have deployed a Virtual Private Network (VPN) to help them improve their data security. If you haven’t, understanding the myriad of benefits that businesses get from deploying a VPN will put in perspective just how useful the VPN can be. 

0 Comments
Continue reading

The Zero-Day Exploit, Explained

The Zero-Day Exploit, Explained

There are malevolent endeavors that happen with the utilization of what are known as "zero-day exploits" that launch attacks on your sensitive data and technological infrastructure. Today, we explain what a zero-day exploit is and why they are such a threat to business. 

0 Comments
Continue reading

Cybercriminals are Using QR Codes to Infiltrate Businesses

Cybercriminals are Using QR Codes to Infiltrate Businesses

QR codes have become a popular tool for businesses to quickly and easily share information with customers. However, cybercriminals have found a way to exploit this technology for their own malicious purposes. In recent years, there has been a rise in QR code scams and vulnerabilities in businesses, making it crucial for companies to understand the risks and take necessary precautions to protect themselves and their customers.

In this article, we will explore the use of QR codes by cybercriminals, the potential vulnerabilities they pose for businesses, and how companies can improve their QR code security.

0 Comments
Continue reading

How to Combat Phishing on Every Level

How to Combat Phishing on Every Level

Phishing attacks present a significant problem for the sustained stability of organizations. That is because they are a pervasive threat and come in several different forms. This month, we will outline some of the ways that phishing can affect an organization and a couple of things that you can do to keep them from being a problem.

0 Comments
Continue reading

Client Service Login

Latest News & Events

This tournament is scheduled to be held Friday, June 10, 2022. The past six years have all been sold-out and this year is shaping up to be another one for the books you won't want to miss. 

Contact Us

Learn more about what Dresner Group can do for your business.

Copyright Dresner Group. All Rights Reserved.