Blog

Technology expertise, advice and tips

Blog

  1. Data Security & Tech Recycling

    The rise of ransomware attacks targeting small and medium businesses has made data security a top priority for IT leaders. While there are many security products available to protect and detect threats, one simple but often overlooked mitigation tactic is proper tech recycling policies. When disposed of improperly, old IT equipment can pose a security…

  2. The Big Business of Ransomware

    Ransomware has emerged as one of the most pervasive and costly challenges in the world of cybercrime. With major companies like Nvidia, Toyota, and SpiceJet falling prey to ransomware attacks, the threat has escalated to new heights. Even entire countries, like Costa Rica, have faced crippling consequences due to these malicious attacks. As the landscape…

  3. WingSwept Ranked on Channel Futures 2022 MSP 501—Tech Industry’s Most Prestigious List of Managed Service Providers Worldwide

    Garner, NC – IT services firm WingSwept, LLC has been selected as one of the technology industry’s top-performing providers of managed services by the editors of Channel Futures. For the past 16 years, managed service providers (MSPs) from around the globe have submitted applications to be included on this prestigious and definitive listing. The Channel…

  4. Best Line of Defense Against Business Email Compromises

    The Cost of Business Email Compromise In May of 2022, the FBI published a report stating that Business Email Compromises account for over $43 Billion in losses Internationally.  In the “2022 State of Email Security Report” from Mimecast, a polling of 1400 organizations showed that 96% of the participants had experienced targeted phishing attacks with…

  5. Managed IT Service Provider: A Buyers Guide

    If you’re considering a new Managed IT Service Provider (MSP) for your business, you probably know how difficult it is to assess them objectively.  Many MSPs tout objective measures like Average Response Time and Mean Time to Resolve. These are important measures, but they can be manipulated by responding before a technician is ready to…

  6. 3 Big Cybersecurity Risks

    As a business leader, it’s challenging to distinguish between significant security threats and those that are less likely to affect your organization. This is especially true nowadays, with frequent reminders about cybersecurity’s importance. While we emphasize cybersecurity’s significance and our role in educating small to mid-sized business leaders, we acknowledge the weariness caused by constant…

  7. What Small and Mid-size Businesses Really Need to Know About Ransomware

    If you’ve been reading technology news lately, you’ve probably seen some sensational headlines about one of the recent ransomware attacks.  What does it really mean for the average small or mid-size business? Ransomware is malware that locks your files away and charges you money to get them back.  It is generally transmitted via email attachment…

  8. Unpatched Vulnerabilities, New Legislation and the FBI Pushing Against a Ransomware Payment Ban

    The expanding threat landscape is making ransomware one of the few bipartisan issues in Congress right now.  But an FBI expert’s testimony proves there are still no easy answers.  Here are the top cybersecurity stories for small and midsize business executives in late July. Software Vulnerabilities Take 6 Months to Patch A recent study found…

  9. What Is a Perimeter Defense?  How to Layer Security

    The explosion of ransomware has many security experts arguing forcefully against a perimeter-only security model.  These experts point out that this approach has led to cyberattacks that have caused billions of dollars of economic damage.  But what is perimeter security?  What does it leave out?  And what should you do instead? Network Vs. Physical Security…

  10. Double Extortion Attacks More Prevalent than Ever

    Ransomware is still all over the place – attacks are up 62% globally and 158% in North America since 2019.  But ransomware-only attacks have mostly been replaced by more sophisticated – and ruthless – attacks. In a traditional ransomware attack, a cyber criminal finds a way onto business networks (often with stolen usernames and passwords)…