Proudly Serving Raleigh, Durham, Cary, Greensboro and Surrounding Areas

Blog

Malvertising: The Intruder You Never Saw Coming

3 min read | Jun 13, 2017

Securing Your Business Against Malicious Ads Malvertising is a catchy term coined by IT industry heads to make it more understandable to businesses and consumers. But merely knowing that malvertising is a malicious form of advertising doesn’t help you defend against it. That’s why Benton Technology Solutions decided to take it one step further and…

Read more »

Why We Use Datto Data Backup and Disaster Recovery

2 min read | May 16, 2017

Datto Is Our Go-To Backup Solution We don’t often highlight the solution partners we utilize for our clients, but given the current cyber security landscape, there’s no better time to introduce our backup and disaster recovery service from Datto, Inc. Let’s delve into our Datto Backup & Disaster Recovery (BDR) system to explain what it…

Read more »

A Hybrid Cloud For Small Business Success

2 min read | Apr 12, 2017

Why A Hybrid Cloud Strategy Helps Small Businesses Thrive IT providers have been raving about the Cloud for years. By now, you know that Cloud services improve collaboration and efficiency for your business, but what if you could get the best of both worlds? Cue the hybrid Cloud strategy… A hybrid Cloud curriculum consists of…

Read more »

March Business Spotlight

2 min read | Mar 15, 2017

Tiger Leather Here at Benton Tech, we are starting a series of Customer Spotlights where we will highlight various businesses we work with and feature the relationships we’ve had the opportunity to build since opening for business. This month, we want to highlight the very first client we ever gained at Benton Tech, Tiger Leather….

Read more »

How To Spot And Prevent A Malicious Email

1 min read | Feb 16, 2017

Did you know that opening an email or downloading an attachment in a spammy message could infect your business with a virus? Today it’s easier than ever for cyber criminals to infiltrate small businesses via email, so before you open that next message in your inbox, read this. Email Security By The Numbers The recent…

Read more »

Inside The Mind Of A Cyber Criminal

2 min read | Jan 11, 2017

Psychoanalyzing a Cyber Hacker 2016 saw cyber threats increase in number and evolve dramatically as businesses became more digitally connected. That trend is sure to continue in 2017, but it will manifest itself in different ways. To help your business prepare and combat these security threats, we’ve put together this psychoanalysis of the 2017 cyber…

Read more »

Drive-By Fraud Alerts: What They Are & How To Combat Them

1 min read | Dec 9, 2016

What Are Drive-By Fraud Alerts? A recent and increasingly dangerous phenomenon called drive-by fraud alerts is beginning to make its mark on Triangle businesses. These alerts will pop up randomly while you are using the internet and alert you that your computer has been infected. It will then prompt you to call a phone number or…

Read more »

Benton Tech Hires Two New Employees!

2 min read | Nov 22, 2016

Meet Our New Hires! We’re adding new members to the Benton Tech family just in time for the holiday season! Scroll through below to meet the brand new additions to our team! Holly Benton Title: Office Manager Q: What do you do at Benton Tech? A: I handle anything non-technical, from the billing and accounting…

Read more »

Email Security Infographic

1 min read | Oct 17, 2016

Email Security Tips for Employees Your employees are on the front lines when it comes to email security. Unfortunately, we’ve found that most business’ staff members are ill equipped to spot malicious emails. That’s a huge problem for small businesses given that they are the most likely targets for phishing email scams. So, to educate…

Read more »

Your Guide To Ransomware In 2016

3 min read | Sep 1, 2016

What is Ransomware? The most daunting threat to the internet as we know it is a popular, fairly new form of hacking called Ransomware. Ransomware is a form of malware that infiltrates your network security veil and seizes your most sensitive files. Once in control of your important documents, it demands a ‘ransom’ payable to…

Read more »