678-837-3954 itresource@sca-atl.com
Our Blog

Best Practices To Avoid A Cyber Attack Via Social Media

The bad guys are targeting social media platforms more than ever to perform Cyber Attacks. These sites include Facebook, Instagram, Snapchat, Twitter, Pinterest and many others. They are using many forms of social engineering techniques to effect your company's...

What is a Phishing Email?

Cyber crime is growing at a rapid pace and it is important for you to know the techniques that the bad guys are using so that you can stay safe. One of the most common is Phishing. Phishing targets you via email, SMS texts or by phone. Phishing is most commonly...

Beware the Pay Stub Scheme

There has been a new threat trending in the cyber security landscape called the Pay Stub Scheme. The bad guys are impersonating your co-workers and requesting that you send them your pay stub. The information they get from the pay stub can back easily lead to identity...

Security Awareness Training

Making sure your employees understand the mechanisms of spam, phishing, spear phishing, malware, ransomware and social engineering and can apply this knowledge in their day-to-day job has become an essential piece of an overall network security strategy. Even with...

What Is Software Patching And Why Do I Need To Do It?

You may hear techies talking about “system patches” or “Windows updates”. Here’s what that means, and why it's important: On a regular basis, Microsoft releases updates to its Windows operating systems that are currently running on millions of computers and servers...

What is HIPAA Compliance?

Understanding security and compliance is essential for health care providers and health care IT professionals alike. Security and compliance go hand-in-hand to keep sensitive health care data safe. Health care is currently one of the fastest growing sectors of the US...

What is a firewall and why do I need one?

A firewall is a system that is designed to prevent unauthorized access to or from a computer network. It is universally acknowledged as a foundational technology component of a network security strategy. Ideally all communication between your computer and internet...