Call us today

(267) 459-8100

Delval Tech Blog

Leading source for news, information & resources for Information Technology

Ransomware Concerns Aren’t just Ransom

Ransomware Concerns Aren’t just Ransom

At this point, everybody has probably heard enough about cyber attacks to get the gist. Hackers come in through a nefarious means. This could range from phishing, to finding a zero day exploit in a server, to just peering over an employees shoulder. From there, they use the way in to steal your data. This includes login credentials, customer information, credit card information and just about anything else that's out there. In the case of ransomware, the most prevalent attack, these hackers...

How an MSP Can Help You Grow

How an MSP Can Help You Grow

Tom owns a small financial firm. Over the last few years, Tom and is firm have been making money for their clients. So much in fact, that their clients are bringing in new clients. He made those clients money, and word ontinued to spread. He had a realization that he was faced with a choice. Did he stop taking on new clients or accept that he had to take his small firm to he next level. Tom, like many, chose the latter. However, he had a lot of concerns. One of which was if his current...

Three Ways AI Cybersecurity Can Benefit Your Business in Pennsylvania

Three Ways AI Cybersecurity Can Benefit Your Business in Pennsylvania

The days of solely using passwords to secure your network and data are over. And your IT team may be comprised of some of the best tech experts you know — but in today’s digital landscape, and with the ever-evolving skill of cybercriminals, it may not be enough to give your Charlotte-based business the protection it needs. The answer may be found in AI cybersecurity, which is artificial intelligence that picks up where your team leaves off. Implementing AI doesn’t mean you have to fire your IT...

The Government Response to CyberCrime

The Government Response to CyberCrime

Cybercrime is on the rise in the United States. With increases of hundreds of precents and an estimated $590 million dollars paid out in attacks in the first half of the year alone, the threat is growing exponentially, and effecting American businesses. After a massive attack on the Colonial Pipeline which caused a brief gas shortage and other attacks on infrastructure by foreign actors, many wondered when our government would act. Currently there is legislation on the table which we will...

Facebook Outage, DNS Servers and Your Business

Facebook Outage, DNS Servers and Your Business

Last week, a curious thing happened. About twenty four hours after a whistleblower spoke about the algorithms Facebook and it’s associated properties used and a member of the team rebutted these claims, an outage occurred. Facebook, WhatsApp, Oculous and Instagram all went down for nearly and entire day, and speculation ran rampant as to the cause. We have witnessed massive ransomware hacks, on police departments, sports teams, and infrastructure this year. One had to wonder, was Facebook, a...

Phishing Attack: Red Flags To Avoid

Phishing Attack: Red Flags To Avoid

Human beings are trusting. This is actually a proven scientific fact, we are wired to trust when oftentimes we shouldn't.  This is a partial explanation for people getting conned throughout history. The conmen of the past have been replaced however, by a new breed, hackers and cyber-scammers. Are you being scammed? Here's some red flags to look out for. Have you gotten a notification that you won some contest you never entered or have been approved for a loan you never applied for? Don't...

The FBI Warns of Ransomware Attacks in Pennsylvania

The FBI Warns of Ransomware Attacks in Pennsylvania

Ransomware attacks have become commonplace as part of national security discourse. Awareness of cybersecurity issues has been raised by the White House, FBI and several corporate giants as a result of increasing risk to businesses of all sizes across the nation. Ransomware attacks are one of the fastest growing and most dangerous cybercrimes in today’s digital landscape. A world record was set this year for the largest ransomware payout, according to Business Insider, with the attacked...

A Cyber-Security Glossary

A Cyber-Security Glossary

Cyber-security is a big issue for many companies. The feeling that you may not be protected can be a scary one, and it’s something that many enterprises grapple with. They want to stay safe, informed, and ahead of the curve. However, the more one looks into these things, the harder they can be to understand. This is why we are going to take some time today to go over some of the terminology and buzzwords that one might encounter, what they mean, and why they are important to your journey into...

Southeast Pennsylvania Flooding and Disaster Recovery

Southeast Pennsylvania Flooding and Disaster Recovery

This past week, the Southeastern Pennsylvania region was hit with an unprecedented storm system. Hit with flooding that rivals Hurricane Sandy, and seven tornadoes touching down in Bucks and Montgomery Counties, the losses experienced were catastrophic for many. Families lost their homes or had their belongings flooded out. Businesses lost offices, assets, and many lost valuable time as their networks were shut down.Hence why disaster recovery protocols are so important. It has been stated in...

What to Know About the T-Mobile Hack

What to Know About the T-Mobile Hack

Hackers are back in the news this week. This time, cellular carrier T-Mobile, which is used by 104 million people on a daily basis, was hit with a massive breach. This breach exposed the data of almost 50 million T-mobile users. This attack was not limited to current users, with former and prospective user data being compromised as well. Reported on August 15th, this breach was one of the largest attacks on a cellular carrier in recent memory. T-Mobile, the second largest cellular carrier in...

Ready To Get Started?