top of page
OUR
BLOG


Don't Let Your Business Be the Next Victim of a Data Breach: Enable 2 Factor Authentication Today!
In today's digital age, cybersecurity threats are becoming more sophisticated and prevalent than ever before. As a result, businesses...
Apr 24, 2023


Top Cybersecurity Threats and How TierTek Can Mitigate Them
Cybersecurity threats have become increasingly prevalent in recent years, and businesses of all sizes are at risk. In fact, small and...
Feb 16, 2023


Phishing emails: A Growing Threat to Online Security
#Phishing #PhishingScams #ITSecurity #TierTek What is Phishing? Phishing is a type of online scam that involves sending fake emails to...
Feb 12, 2023


Is That Really a Text from Your CEO... or Is It a Scam?
#Phishing #PhishingScams #ITSecurity #TierTek Imagine you’re going about your day when suddenly you receive a text from the CEO. The head...
Feb 8, 2023


Mobile Malware Has Increased 500% - What Should You Do?
#MobileMalware #MobileSecurity #ITSecurity #TierTek Cybersecurity researchers uncovered an alarming mobile statistic. During the first...
Feb 3, 2023


5 Ways to Balance User Productivity with Solid Authentication Protocols
At TierTek we find that one constant struggle in offices is the balance between productivity and security. If you give users too much...
Jan 11, 2023


What's Changing in the Cybersecurity Insurance Market?
Cybersecurity insurance is still a pretty new concept for many SMBs. It was initially introduced in the 1990s to provide coverage for...
Jan 10, 2023


What Are the Advantages of Implementing Conditional Access?
TierTek realizes that as long as passwords have been around, they’ve been a major source of security concern. Eighty-one percent of...
Jan 6, 2023


What to Include in a Year-end Technology Infrastructure Review
With the year at a close, here at TierTek we believe it’s the perfect time to plan for the future. Most businesses begin the year with...
Jan 3, 2023


Simple Setup Checklist for Microsoft Teams
Microsoft Teams is a lot of things. It’s a video conferencing tool, a team messaging channel, and a tool for in-app co-authoring, just to...
Dec 30, 2022


Improve Customer Experience in 2023!
Here at TierTek we believe that paying attention to your customer experience directly impacts your bottom line. Companies that are...
Dec 28, 2022


5 Biggest Questions About Windows 11 Answered
Microsoft’s latest operating system is starting to take the world by storm. But before jumping ship and upgrading to the new OS, better...
Oct 15, 2021


Must ask questions for choosing the right IT Support company for your business.
Hiring an outside IT Support provider to streamline and support your small business is an important task most businesses must face. Here...
Jun 9, 2020


Video Conferencing Etiquette
Practice good video conferencing etiquette You don’t want to be the person in your organization known for scheduling lots of unproductive...
Jun 4, 2020


New Live Chat!
We are excited to announce another new way to communicate directly with TierTek support, Live Chat! To access this feature you simply...
May 26, 2020


Remote Work Myths
When IT Remote Work is mentioned it immediately conjures up mixed feelings and sometimes absurd myths with statements like these... WOW!...
May 21, 2020


When To Use Chat vs Video As A Remote Worker
Chat vs Video!
May 17, 2020


Returning to the Workplace Precautions
Slowly we are seeing a return to normal here in the State of Florida, our Indiana office and clients are still facing uncertain times but...
Apr 30, 2020


6 Phishing Signs
Can you spot a fake email? Phishing is a scam that attempts to obtain sensitive information such as your passwords, banking information,...
Apr 20, 2020


Phishing: Are You Protected?
The attempt to fraudulently gather sensitive information from you by attempting to disguise oneself as a trusted entity is known as...
Mar 23, 2020
bottom of page