3 Social Listening Tactics to Generate New Customers

Vast numbers of employees now work remotely, and it’s too late to develop a set of remote-work policies if you didn’t already have one. But there are ways to make the remote-work experience productive and engaging — for employees and the organization. Use both direct conversations and indirect observations to get visibility into employees’ challenges […]

Read More

Questions every business owner able to answer

Vast numbers of employees now work remotely, and it’s too late to develop a set of remote-work policies if you didn’t already have one. But there are ways to make the remote-work experience productive and engaging — for employees and the organization. Use both direct conversations and indirect observations to get visibility into employees’ challenges […]

Read More

This week’s topic: Brute Force Attacks

A properly run brute force attack can put many passwords generally considered complex, at risk. By customizing their attack with additional variables, a cybercriminal can have a much easier time breaking into an account of their choosing. In this week’s security tip video, learn about how brute force attacks are performed and what steps you […]

Read More

This week’s topic: Spear Phishing

Spear phishing is often considered one of the most dangerous forms of phishing. These well-crafted malicious emails include personal details that can make them very convincing and difficult to spot. In this week’s security tip video, learn how a spear-phishing email is crafted and some of the ways you can protect yourself from becoming the […]

Read More

Product of Month – Remote Managed Power

The Key to Budget-Friendly IT:  Automation and Simplicity Perhaps you’ve been here? An unresponsive device in your network has halted productivity (and therefore revenue) in your office. Southridge Support quickly determines the device needs a reboot. But there are so many devices and wires and switches in the IT closet, everyone agrees that an employee […]

Read More

This week’s topic: Vacation Scams

Whenever you are ready to begin planning your next vacation, it is important to be mindful of some of the common vacation scams that dupe consumers each year.  In this week’s security tip video, learn about some of the common vacation scams that you need to be on the lookout for before planning your next […]

Read More

This week’s topic: Bitcoin Blackmail

Reports of a devious bitcoin blackmail scam are on the rise. Scammers are dusting off a classic trick in an effort to steal your money.  In this week’s security tip video, learn about how this bitcoin blackmail scam works and how you can protect yourself. Watch this week’s Security Tip by Southridge Technology Quick Tips […]

Read More

This week’s topic: Spoofing

Spoofing is a cybercriminal’s malicious misrepresentation of a phone number, website, or email. By masking their true identity, a cybercriminal is more likely to pull off their scam. In this week’s security tip video, learn about the different forms of spoofing, and how you can protect yourself. Watch this week’s Security Tip by Southridge Technology […]

Read More

This week’s topic: Keyloggers

A keylogger is a tool designed to silently spy and record your daily activities on a device. Once a keylogger is installed, it can feed that information directly to a cybercriminal in real-time. In this week’s security tip video, learn about what a keylogger does and how you can protect your devices. Watch this week’s […]

Read More

This month’s topic: The Privacy Issue

Protecting our privacy is always a top concern and for a good reason. With so much information being shared, posted, or exchanged digitally, it is more important than ever before that we control the destiny of our private information. In this month’s security newsletter, learn some of the steps you can take to keep your […]

Read More