704-707-3333
contact@jcmr.net
Facebook
Twitter
LinkedIn
  • Home
  • About
    • Community Investment
    • Careers
  • Services
    • Infrastructure Alignment
    • People & Processes
    • IT Management
    • IT Security
    • Business Performance
    • IT Staffing
    • Managed & Cloud
  • Testimonials
  • Partners
    • Juniper
    • Microsoft
      • Azure
      • Enterprise Mobility Suite (EMS)
      • Schedule a Microsoft demo
    • Palo Alto
      • End Point
      • Firewall
      • Schedule A Palo Alto Demo
    • VMware
    • All Partners
  • Contact
    • Support
  • Blog

Author: Jake Kent

Home Articles Posted by Jake Kent
135 posts, 0 comments
http://www.jcmr.net

Data Loss Can Cause You to Shut Down

Jake KentBusiness PerformanceJuly 17, 2020

    Small and medium sized businesses today are relying more than ever on IT systems to efficiently run their business, support customers and optimize productivity. These systems house sensitive digital data ranging from employee and customer information, to internal…

Can You Really Afford Not to Have a Backup Plan?

Jake KentBusiness PerformanceJuly 10, 2020

    According to Symantec SMB, 50% of SMBs admit to having no backup and disaster recovery plan in place. 41% of those surveyed confessed that they had never even given much thought to implementing a disaster recovery or business…

Cyber hygiene: The key to your business’s good cyber health

Jake KentBusiness PerformanceJune 12, 2020

Cyber hygiene: The key to your business’s good cyber health We all know that basic hygiene is a must to lead a healthy life. Did you know that the same rule applies to IT as well? There’s something known as…

Free Internet Access? Don’t fall for this one

Jake KentBusiness PerformanceJune 5, 2020

Free Internet Access? Don’t fall for this one One of the popular internet scams that has been doing the rounds since 2017 is the one about “Free Internet”. This scam seems to resurface and somehow manages to claim quite a…

Online shopping? Watch out for these red flags

Jake KentBusiness PerformanceMay 29, 2020

Online shopping? Watch out for these red flags Who doesn’t like online shopping? Online shopping has opened up a whole new world to us. Get whatever you want, whenever you want, without wandering from store to store. It doesn’t matter…

DNS Cache poisoning: What every SMB must know

Jake KentBusiness PerformanceMay 22, 2020

DNS Cache poisoning: What every SMB must know In one of the most common poisoning attacks, the attacker poisons the DNS Cache with the aim of leading visitors to a fake website. In a DNS cache poisoning case, the attacker…

Protecting yourself against poison attacks

Jake KentBusiness PerformanceMay 15, 2020

Protecting yourself against poison attacks Data poisoning by way of logic corruption, data manipulation and data injection happen when the attacker finds a way to access your data set. The kind of poison attack varies depending on the level of…

Poison Attacks: A quick overview

Jake KentBusiness PerformanceMay 8, 2020

Poison Attacks: A quick overview Smart technology is everywhere. Not just in our offices, but even in our day-to-day lives with tools like Google Home and Alexa becoming a commonplace. With technology becoming smarter every minute, the risks are increasing…

Employee training and Cybersecurity

Jake KentBusiness PerformanceMay 1, 2020

Employee training & Cybersecurity Employee training will form a big part of the cybersecurity initiative that you will take on as an organization. You need to train your employees to identify and respond correctly to cyberthreats. Here are some employee…

Strengthening your cybersecurity policies

Jake KentBusiness PerformanceApril 24, 2020

Strengthening your cybersecurity policies Formulating strong IT policies and laying down the best practices for your staff to follow is one of the best ways to prevent your business from becoming a victim of cybercrime. In this blog, we explore…

Why do you need a top-down approach to IT security?

Jake KentBusiness PerformanceApril 17, 2020

Why do you need a top-down approach to IT security? For any organization, its employees are its biggest assets. But, what happens when your biggest assets turn out to be your greatest threats or liabilities? That is how cybercrime can…

3 steps you can take to protect your data in the Cloud

Jake KentBusiness PerformanceApril 10, 2020

3 steps you can take to protect your data in the Cloud Moving to the Cloud offers tremendous benefits for SMBs that range from lower IT costs to any-time access to data and certainly more reliability in terms of uptime….

Is the Cloud really risk-free?

Jake KentBusiness PerformanceApril 3, 2020

Is the Cloud really risk-free? The Cloud presents plenty of benefits that make it a very attractive choice, especially for SMBs who don’t want to be burdened with higher in-house IT costs, putting your data in the Cloud is not…

Things to consider before switching to the Cloud

Jake KentBusiness PerformanceMarch 27, 2020

Things to consider before switching to the Cloud More and more businesses are switching to the Cloud to store their data and rightly so. The Cloud offers numerous benefits over the traditional, physical on site server. For example, Anytime, anywhere…

Multi-factor Authentication Demystified

Jake KentUncategorizedMarch 13, 2020

Multi-factor Authentication Demystified You have probably come across the term multi-factor authentication of late. It is an IT buzzword today and is fast becoming one of the best practices of cybersecurity. So, what is multi-factor authentication, exactly? Read this blog…

4 Lesser-known benefits of hiring an MSP

Jake KentUncategorizedMarch 6, 2020

4 Lesser-known benefits of hiring an MSP You are probably aware of the most common benefits of signing up with an MSP such as On-demand IT support: Having an MSP ensures that you get priority IT support when you need…

Dark web monitoring: What you need to know

Jake KentUncategorizedFebruary 28, 2020

Dark web monitoring: What you need to know The dark web is essentially a marketplace for cyber criminals. If your data has been compromised, the dark web is the place where it is traded. It could be sold by miscreants,…

The dark web: An introduction

Jake KentUncategorizedFebruary 21, 2020

The dark web: An introduction Have you come across the term, dark web, recently? As a business, you might have heard that you need to keep your data safe from the dark web. So, what is the dark web anyway?…

What to consider before hiring an MSP for your Dental Practice

Jake KentUncategorizedFebruary 14, 2020

What to consider before hiring an MSP for your Dental Practice No doubt, having an MSP to manage the IT requirements of your dental practice offers multiple benefits. But, be sure to consider the following before you sign up with…

Benefits of hiring an MSP for Dental Practices

Jake KentUncategorizedFebruary 7, 2020

Benefits of hiring an MSP for Dental Practices When we talk about the benefits of hiring a Managed Services Provider–an MSP for businesses, the kind of businesses we think about are retail, shops, restaurants, etc. We often tend to overlook…

5 Important IT checklists that no SMB should miss: Part-2

Jake KentUncategorizedJanuary 31, 2020

5 Important IT checklists that no SMB should miss: Part-2 In our last blog, we discussed 2 of the 5 important IT checklists that every SMB should have. In this post, we cover the other 3, namely, IT training, Data…

5 Important IT checklists that no SMB should miss: Part-1

Jake KentUncategorizedJanuary 24, 2020

5 Important IT checklists that no SMB should miss: Part-1 IT checklists are a great way to analyze, understand and take the necessary steps to meet your IT requirements. In this blog, we discuss 2 of the 5 important IT…

Know your IT risks

Jake KentUncategorizedJanuary 17, 2020

Know your IT risks Whether you have your in-house IT team, or have outsourced your IT needs to be taken care of by a Managed Services Provider, you need to know what are the possible risks to your business from…

What to consider when investing in cyber insurance

Jake KentUncategorizedJanuary 10, 2020

What to consider when investing in cyber insurance As a business, you are probably aware of the term, cyber insurance. With the cybercrime rates rising consistently, cyber insurance is increasingly becoming a necessity for survival. Here are a few things…

Cyber insurance: What’s the cost and what does it cover

Jake KentUncategorizedJanuary 3, 2020

Cyber insurance: What’s the cost and what does it cover Cyber insurance covers a range of elements, the most basic being the legal expenses incurred as a result of falling victim to cybercrime. This includes legal fees, expenses, and even…

Posts navigation

1 2 3 4 … 6 >

Recent Posts

  • Data Loss Can Cause You to Shut Down
  • Can You Really Afford Not to Have a Backup Plan?
  • Cyber hygiene: The key to your business’s good cyber health
  • Free Internet Access? Don’t fall for this one
  • Online shopping? Watch out for these red flags

JCMR Technology

Address:
5950 Fairview Road, Ste 725 Charlotte, NC 28210
P: 704.707.3333
E: Contact@JCMR.net
  • Home JCMR
  • About Us
  • Services
  • Testimonials
  • Partners
  • Contact Us
  • Blog
  • Site Map

© 2019 All rights reserved. JCMR Technology