We can help. See how!

What is The Cloud?

The cloud is always a hot topic and with good reason as it is continuously evolving. There are many questions about the cloud. Is it safe? Is it for me? Will it save me money? But, before we can explore these critical questions, we have to cover the basics being, what is it? We have all heard of the cloud, but very few truly understand what the cloud is or where it resides.

Read more

Business Email Compromises are No Myth

Real-life examples of BECs

 

If you have been following the news, you should know that we are all at risk of Business Email Compromises (BEC). You may be growing tired of hearing this fact although it is a fact that we need to keep in the front of our minds at all time! Timing is a factor that these cybercriminals are continually accessing and know how to attack when your guard is down. Below are real-life examples of BECs that illustrate how easily these attackers researched, planned and struck at the right time and were able to victimize educated, experienced business people.

Read more

Education is The Strongest Line of Defense

Business Email Compromise and Education

This month at Pendello we have been focusing on Business Email Compromise as the risk is definitely on the rise. If you remember, Business Email Compromise (BEC) is when an organized crime group gains access to your email through deception with the use of spear-phishing, identity theft, email spoofing, malware, and social engineering. In the past two weeks’ blogs, we introduced BECs and the different types of attack attempts. This week we are delving into how to recognize attack attempts. As 93% of all investigated data breaches can be traced back to a specific employee, we at Pendello Solutions know that end-user education is your best defense. So this month Pendello is bringing you some guidelines to look for when dealing with your day to day communications.

Read more

Compromised Emails: What are They? Are you a Target?

The global risk of compromised emails is on the rise and should be a concern of every business organization. Some industries are targeted more often, but if your business uses email, you need to be aware of the risk and what the threat entails. To understand the risk, we need first to understand what a compromised email is and how it occurs. These risks are real and have been the cause of great financial destruction for many companies.

Read more

Pendello's Top 3 CES 2019 Announcements

CES 2019 which is owned and produced by the Consumer Technology Association is coming to a close tomorrow and once again has wowed the world with new announcements of groundbreaking technology and solutions. This global stage has been the meeting place for all things new and innovative for over 50 years and once again, has showcased a wealth of new and incredibly innovative technologies. Themes this year are Smart Homes, 5G, AI and massive TVs and monitors. As of today, the following are Pendello’s top three spotlights on new technology that we are excited about.

Read more

Pendello’s Shocking Discoveries: A Series of Very Cool IoT Devices Designed for Businesses

This month Pendello Solutions is taking a closer look at the Internet of Things (IoT) designed with businesses in mind. There are a plethora of IoT devices, but most of the well-known devices are intended for personal use in the home. Here at Pendello Solutions, business technology is our business, and we thought many of you might want to learn a bit more about how IoT is shaping the business world.

Read more

What is Mike digesting in October?

The Antithesis to, “What’s Eating Gilbert Grape.”

October’s look at what Pendello President, Mike Jackson, is currently reading or listening to:

 

Read more
1 2 3 4 5

Recent Posts

20 Critical Questions You Must Ask Before Hiring any IT Company