G Suite Security: Advanced Security for Modern Threats

In multiple blog posts over the past 2+ years, we have covered the changing and growing nature of threats to your organization, systems, and people. G Suite security offers advanced measures to protect user data, including encryption, 2-step verification, phishing protection, and admin controls.  For us the answer is CPR … Communicate and Educate; Prevent […]

Google+ Changes: What you need to know

In December 2018, Google announced that the consumer version of Google+ is shutting down in April 2019.  As the usage lines between the consumer and business versions of Google+ have often been blurry, we want to clear up some of the confusion following the notices you may be getting from Google. What is happening? The […]

G Suite Price Hike: Your Next Steps

Anytime a vendor critical to your business changes their product and pricing, it is tempting to reassess. We may see the world differently than other IT providers, but we, the team at Cumulus Global, strongly agree.  Now is a good time to examine your cloud services, as part of your full IT ecosystem, and determine […]

Managing the Impact of the G Suite Price Increase

To help manage the impact of the pricing increase, we are able to offer renewal and upgrade discounts based on your current licensing. Converting from Monthly/Flex to Annual locks in the current pricing for a year. Upgrading your G Suite Version provides you a discount off the current upgrade pricing for 12 to 24 months. Convert […]

G Suite Price Increase

As you are likely aware, Google announced a 20% price increase for G Suite Basic and G Suite Business Editions, along with a discontinuation of the discounted pricing for G Suite Basic when prepaid annually. The Basics Effective April 2, 2019, the pricing for G Suite Business and G Suite Basic will increase as noted […]

For 2019: Focus on Outcomes

As we close out 2018, we reflect on a year that has been a bit of a wild ride.  For our customers, we clearly are leaving a period of sustained growth into more uncertain economic times. At the macro level, the economy shows competing signs of growth and contraction. Our political climate is less certain […]

Drive-by Downloads

This post is part of our Cyber Threat Series. The Challenge: Drive-by downloads are exploit kits that download invisibly from infected websites. These websites may be malicious sites built for malware distribution or trusted sites infected by hackers. Many of these attacks take advantage of weaknesses in popular software and tools, including video players, Java, and […]

Phishing and Spear Phishing

This post is part of our Cyber Threat Series. The Challenge: Cyber criminals prefer Phishing attacks. Phishing and Spear Phishing remain the primary vector for Malware attacks. Hackers evenly distribute attacks between two variants: Malicious Email Attachment (39.9%)  and Malicious Link (37.4%). Leveraging human nature, phishing attacks look and feel like legitimate emails. Recipient often miss […]

Brute Force Attacks: What are They and How to Protect Against Them

What is a brute-force attack? A brute-force attack is a method used by cybercriminals to crack passwords or encryption by trying all possible combinations of characters until the correct one is found. It involves using automated software that systematically tries different combinations of characters until the password or encryption key is discovered. Brute-force attacks can […]

Distributed Denial of Service Attacks and How to Prevent Them

What is a Distributed Denial of Service Attack? A distributed denial of service (DDoS) attack is a malicious attempt to disrupt the normal functioning of a targeted website, server, or network by overwhelming it with a flood of internet traffic from multiple sources. An example of a distributed denial of service attack One well-known example […]

What are Hostile Network Probes and Scans

This post is part of our Cyber Threat Series. The Challenge of Hostile Network Probes and Scans: Hostile network probes and scans check your network devices and systems for security holes. Hackers and bots scan specific IP address for open and unsecured ports. While most scans come from the outside, hackers use malware to infect systems […]

Cyber Threat Series Overview

Protecting your network, systems, apps, data, and people is no easy task as the scope and variety of attacks continues to multiply.  You want and need to protection, but must make smart buying and decisions. Too little or too much means higher risk or unnecessary cost. We see your business as a target not because […]

Partnering for G Suite Productivity with Our Top 9 Tips

Google Workspace (formerly G Suite) is more than an email, calendar, and simple file sharing service.  G Suite is a productivity suite that serves as a platform for a range of tools that helps your team, and your business, work more effectively. It is a cloud-based productivity suite developed by Google that includes a range […]

What You Don’t Know Can’t Help You

I expect you have heard the old saying: “What you don’t know won’t hurt you.” — Anonymous In the cloud-y world of IT services and solutions, the lesson is better expressed as: “What you don’t know, can’t help you!” — Allen Falcon For a long time, small and midsize businesses (SMBs) moved to the cloud […]

When Your Identity is on the Dark Web

As a courtesy to our existing clients and prospective clients, we have been running complementary Dark Web Summary Scans of their domains. These summary scans let us know how many email addresses from each domain currently appear on dark web and identity theft websites. We can then perform a more detailed scan and analysis to […]

EFail Flaw: Encryption Alone Does Not Protect Your Email

As reported last week by eWeek and others, researched found two flaws that allow hackers with access to email accounts to read emails encrypted with OpenPGP and S/MIME.  This is significant for two reasons: These standards are available for us in almost every email client Budget-conscious users often relay on public-domain or free tools to use […]

What is Slowing Down Your Internet? 5 Things Hurting Your Connection Speed

Bad WiFi service frustrates employees, hurts productivity, and can send customers to your competitors. Even if you use your wireless access point (AP) vendor’s management tool, there are still things that may be hurting your WiFi service quality or slowing down your internet speed without your knowledge. Read on below to learn about network connectivity, […]

WiFi Quality is About the User Experience

An ever increasing number of businesses are learning that WiFi is more than a convenient network connection. Restaurants, bars, and coffee shops that want patrons to linger and spend more lose business when customers can’t check the score, answer an email, or scan their social apps. When your mobile app doesn’t work in your establishment […]

Echo of Non-Compliance

Everyday, we hear about new ways we can use our smart speakers. Retailers, radio stations, product companies, and others remind us that we can use our Amazon Echo or Google Home to buy, listen, or learn. The term “smart speaker”, however, is misleading.  These are microphones and they are always listening. They are also likely […]

Inertia: The Science of Business Continuity

To paraphrase Newton’s Laws of Motion (with credit to Galileo) … Absent an unbalanced force, an object in motion will stay in motion and an object at rest will stay at rest. While this holds true for objects in a friction-less environment, it holds true for our businesses as well. Our businesses are in motion, […]