Category: Security

Mar 13, 2023

Cybersecurity for Michigan SMBs

Small and medium-sized businesses (SMBs) face a growing threat from cyber criminals. The digital age has made it easier for businesses to connect with customers or employees and expand their reach, but it has also created new vulnerabilities. Michigan SMBs must prioritize cybersecurity to protect themselves, their customers, and their data. Michigan is home to […]

Read
Background with skyscrapers, image in center of cybersecurity symbols
Feb 28, 2023

Multifactor Authentication (MFA) is a Must-Have

Multifactor authentication (MFA) is a must-have.  MFA is an additional layer of security used to protect user accounts from unauthorized access. It requires users to provide two or more forms of identification before granting access to an account. MFA makes it much more difficult for attackers to access accounts even if they have stolen login […]

Read
Feb 14, 2022

Safety Net Named as a Top MSP for SMB IT Support

2022 MSP 500 – Pioneer 250 Safety Net, a Managed Service Provider in Farmington Hills and Traverse City, Michigan has been named by CRN®, a brand of The Channel Company, to its 2022 Managed Service Provider (MSP) 500 list in the Pioneer 250 category, making them a top MSP for SMB.  The Pioneer 250 category […]

Read
Lighting striking tall buildings
Jan 28, 2022

10 Steps to a Successful Business Continuity Program

Creating, practicing, and maintaining a successful Business Continuity Management (BCM) program requires detailed documentation, diligence, and discipline. It is an involved process that will only succeed when you have the right buy-in, and the right resources working together to develop, implement, and audit it. “Business Continuity Planning can be described as a three-legged stool,” says […]

Read
Dec 15, 2021

Microsoft Office 365 (M365) Quarantined Message Scam

Important information about quarantined message phishing from our partners at KnowBe4: In a new scam, cybercriminals spoof Microsoft Office 365 by using the email address quarantine[at]messaging[dot]microsoft[dot]com to send you a spam notification. The fake notification claims that a seemingly important email with the subject line “[Your Organization’s Domain] Adjustment: Transaction Expenses Q3 UPDATE” has been […]

Read
Dec 03, 2021

A New Scam – Order Confirmation Emails

If you’re shopping online for the holidays, you will receive order confirmation emails.  Unfortunately, cybercriminals have found yet another way to take advantage of generous gift givers who purchase presents online. What Order Confirmation?! In a new scam, the bad guys of the cyber world impersonate Amazon and send fake order confirmation emails.  Their goal?  […]

Read
Data Loss: 5 Scenarios
Oct 27, 2021

Data Loss: 5 Scenarios to Consider

As businesses shift resources to the cloud, Microsoft 365 (previously known as Office 365) is quickly becoming the standard. Cloud-based software can save your organization money and downsize your premise server environment, but it can also lead to a false sense of security if you assume Microsoft will handle all your data retention and recovery […]

Read
Oct 05, 2021

Digital Security at Home

As the internet and “cloud” all become more and more ingrained with our day-to-day lives, we may forget to stop and take a minute to think about how we approach digital security with our own personal information. You may think you do not have anything a hacker would want to steal, but remember, most attacks […]

Read
notpetya protected
Jul 08, 2021

5 Tools to Protect Your Small Business Against a Cyber Attack

The recent cyber attack against Kaseya is just plain scary.  Hundreds of small businesses across the world were impacted.  Some of them may go out of business.  Others may have lost years of valuable data, and the confidence of their customers. No single IT security practice or tool will protect you from the growing threat […]

Read
Phone on table
May 25, 2021

7 Ways to Protect Against Spoofing

What is Spoofing? According to the FCC, “Spoofing is when a caller deliberately falsifies the information transmitted to your caller ID display to disguise their identity.”  Scammers use spoofing to make it appear as though a call is coming from a local number, or a company or agency that you recognize and trust.  If you […]

Read