Author name: Matt Moline

GRIT Technologies Visits the Classroom. Jason Zurro Dawson Elementary School’s Career Day

GRIT Technologies Visits The Classroom

Our very own Jason Zurro was front and center stage last week at Dawson Elementary School’s Career Day.  Jason was invited to speak to Dawson’s 2nd grade class about his role as a Network Operations Manager and discussed several different areas of interest within the IT industry. Students learned about the evolution of computers, from

GRIT Technologies Visits The Classroom Read More »

Matt Lang Matt Lang Why You Should Restrict Admin Rights video image clip

Cybersecurity Awareness Month: Why You Should Follow The 3-2-1 Backup Rule

https://www.youtube.com/watch?v=hODqv3smyT8 Backing up your data regularly is an overlooked step in personal online security. The top IT and security managers follow a simple rule called the 3-2-1 backup rule. Essentially, you will keep three copies of your data on two diverse types of media (local and external hard drive) and one copy in an off-site location (cloud storage).  If

Cybersecurity Awareness Month: Why You Should Follow The 3-2-1 Backup Rule Read More »

GRIT Named to Inc. 5000 Fastest-Growing Companies List for the 4th Year in a Row

GRIT Named to Inc. 5000 Fastest-Growing Companies List for the 4th Year in a Row

For the 4th year in a row, GRIT Technologies announced today that the company has been selected for the 2021 Inc. 5000 Fastest-Growing Private Companies in America list. With 96% revenue growth over the past three years, it secured spot 3,540 on the list. GRIT provides IT solutions for small to medium-sized businesses including help desk support, proactive

GRIT Named to Inc. 5000 Fastest-Growing Companies List for the 4th Year in a Row Read More »

Why Training Users on Phishing is important thumbnail

Cybersecurity Awareness Month: Why Training Users On Phishing Is Important

https://www.youtube.com/watch?v=cHGE2tu5bQc Phishing scams are nastier than ever this year. In a phishing scheme attempt, the attacker poses as someone or something the recipient recognizes and attempts to trick the target into divulging credentials, clicking a malicious link, or opening an attachment that infects the user’s system with malware, trojan, or zero-day vulnerability exploit.   This often leads to a ransomware attack. In

Cybersecurity Awareness Month: Why Training Users On Phishing Is Important Read More »

Why you should monitor the dark web thumbnail

Cybersecurity Awareness Month: Why You Should Monitor The Dark Web

https://www.youtube.com/watch?v=02rCPpiIP_I Let’s ask a question.  If you don’t know something is a problem, how can you take action? One of the biggest problems businesses are facing is stolen credentials from data breaches.  These credentials are sold on the dark web and are used to gain access to business networks to steal data, deploy malware, or encrypt and hold the

Cybersecurity Awareness Month: Why You Should Monitor The Dark Web Read More »

Matt Lang Why You Should Restrict Admin Rights thumbnail

Cybersecurity Awareness Month: Why You Should Restrict Admin Rights

https://www.youtube.com/watch?v=FRlf7OoCLUM The Importance of Restricting Admin Rights One overlooked issue for many businesses, is having everyone setup as a local administrator.   By making too many people local administrators, you run the risk of people being able to download programs on your network without proper permission or vetting. One download of a malicious app could spell disaster as this could

Cybersecurity Awareness Month: Why You Should Restrict Admin Rights Read More »