2232 Page Road | Suite 103 | Durham, NC 27703

Blog

Drive-By Fraud Alerts: What They Are & How To Combat Them

What Are Drive-By Fraud Alerts? A recent and increasingly dangerous phenomenon called drive-by fraud alerts is beginning to make its mark on Triangle businesses. These alerts will pop up randomly while you are using the internet and alert you that your computer has been infected. It will then prompt you to call a phone number or…

Read more »

Benton Tech Hires Two New Employees!

Meet Our New Hires! We’re adding new members to the Benton Tech family just in time for the holiday season! Scroll through below to meet the brand new additions to our team! Holly Benton Title: Office Manager Q: What do you do at Benton Tech? A: I handle anything non-technical, from the billing and accounting…

Read more »

Email Security Infographic

Email Security Tips for Employees Your employees are on the front lines when it comes to email security. Unfortunately, we’ve found that most business’ staff members are ill equipped to spot malicious emails. That’s a huge problem for small businesses given that they are the most likely targets for phishing email scams. So, to educate…

Read more »

Your Guide To Ransomware In 2016

What is Ransomware? The most daunting threat to the internet as we know it is a popular, fairly new form of hacking called Ransomware. Ransomware is a form of malware that infiltrates your network security veil and seizes your most sensitive files. Once in control of your important documents, it demands a ‘ransom’ payable to…

Read more »

5 Ways To Spot A Malicious Email

Email has become the popular medium among cyber criminals for implementing malware on unsuspecting victims. Thus, we’ve taken strides over the past few months to explain why email security is so vital. However, it’s also important that businesses know how to spot malicious emails right off the bat. To help your employees better protect themselves…

Read more »

5 Reasons Why VoIP Technology is a No-Brainer for Small Businesses

VoIP technology is quickly becoming the best friend of businesses everywhere, and it could be your ticket to the next level of communication technology. VoIP is a type of internet telephone system that allows your employees to access company networks from their phones at any time. If you have not yet considered business VoIP services,…

Read more »

Email Security Best Practices for Small Businesses

2016 has been quite the year for hackers. Hospitals, insurance firms and even federal government agencies are all recent victims of data security breaches that have called our nation’s cyber defense into serious question. But as we progress into the latter half of the year, the threats persist; most recently in the form of 272.3…

Read more »

Surviving A Ransomware Attack

Union Memorial Hospital in Baltimore, MD is ground zero of a recent malware attack which targeted numerous MedStar hospitals around the country. The criminals at the helm of the intrusion have demanded 45 bitcoins, or $18,500, in exchange for the key to unlock the infected data. But MedStar is not the only business entity vulnerable…

Read more »

White House To Hire First-Ever U.S. Chief Information Security Officer

What You Need To Know In the wake of the OPM data breach that garnered national attention, the White House has taken bold strides to improve the Nation’s cybersecurity. Armed with the tools provided in the recently-passed Cybersecurity Act of 2015, the Federal Government now has the resources to truly impact our digital safety. So…

Read more »

2016 Managed IT services: 4 benefits and 3 stats

Why Invest in Managed IT Services? Managed IT services have evolved at a rapid pace over the past few years. As the digital era has sped up and given rise to the mobile revolution, IT departments have struggled to keep up – until now. Cue managed service providers (MSPs), designed for the modern company and the…

Read more »