Cyber Insurance: What it is & Why you need it

Brittany Pescetto Uncategorized

This is custom heading element I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Don’t Fall through the KRACK

Brittany Pescetto Uncategorized

KRACK does not go get a device, but grabs the data that is wirelessly being sent by devices. Here is an article offering more detail. If you are using a Windows 10 machine, the good news is that if you are a Newberry support client we’ve already released a patch that will protect you. If you are using an older …

Phishing for donations

Brittany Pescetto Cybersecurity, Phishing

While the aftermath of Hurricane Harvey continues to pummel Texas, the United States Computer Emergency Readiness Team warns of existing fictitious disaster relief scams, preying on the charitable. With August marking just over 12 years since Hurricane Katrina ravaged New Orleans, the devastation has lasted far longer than the storm, and it’s happening again. When Katrina struck, FEMA dished out nearly $500 million in federal aid, more …

Pacemaker Vulnerability

Brittany Pescetto Blog, Cybersecurity

Tuesday the FDA released a recall notice issued to those who currently have a pacemaker manufactured by the Abbott (formerly St. Jude Medical). A firmware update is now available as an emergency corrective action, to quickly reduce the risk of patient exploitation. If you’re affected by this recall, the firmware update requires in in-office visit your health care provider for …

Customer Relationship Management – Automate Your Sales and Marketing

Brittany Pescetto Blog, Tip of The Week

Manage your current and future customers with a comprehensive customer relationship management solution. As a business owner, you have a lot of responsibility. You need to consider many variables just to keep your organization productive and profitable. Your employees are behind the scenes working to make your brand the best it can be. Just as important as you and your …

Insider Threat – the Levandowski Effect

Brittany Pescetto Blog

In a recent study by IBM, reserchers found that over half ofdata breaches are a result of internal actors leaking sensitive data, and currently ex-engineer Anthony Levandowski is under fire for doing just that. Levandowski, a former technology lead for Alphabet, Google’s parent company, and creators of the self-driving car Waymo, is currently in the technological legal battle of his …

Wanna Cry?

Brittany Pescetto Blog

Ransomware is a malicious software that locks your data until you pay a “ransom” to retrieve it. Last week, to the terror of many business owners, WannaCry ransomware spread rapidly to over 150 countries, leaking tons of data and rendering many banks, hospitals and universities, and governments helpless against encryption. WannaCry’s asking price? $300 in Bitcoin, a price that doubles …

Understanding PCI DSS

Brittany Pescetto Uncategorized

The Newberry Group provides solutions for companies searching for a secure interface in which to transfer sensitive information. Does your business accept credit cards? Do you need it to? In order to open your Maryland area small business up to the enhanced profit potential that accepting credit cards can provide, you’ll need to understand what responsibilities you take on by …

Understanding Automation

Brittany Pescetto Uncategorized

Business technology is the bane of the modern worker. No matter how well-intentioned the members of your staff are, when they have computer troubles, it complicates everything they are trying to accomplish. This, in turn, complicates every goal you are trying to accomplish. The automation of IT service delivery gives you a direct line to a stronger business by streamlining …

IT Services Done Differently

Brittany Pescetto Uncategorized

We’re in this business to help other small businesses grow and move forward. It’s as simple as that. We’re driven by the philosophy that if we help local businesses solve their IT issues so they can become more profitable and successful, then we will inherently grow along with them. There is no catch, no gimmick, just experience and best practices …