1. Encrypted Traffic Analytics – Why Should You Care?

    I was recently introduced to Dave McGrew – Cisco’s version of Yoda! This unassuming, humble engineer looks like a geography teacher and is the kind of guy who creates encryption algorithms in his spare time as a hobby – just like we might do crosswords (OK, I don’t do crosswords but you get my point). However, Dave is a Cisco Fellow – to put this in perspective Cisco has over 20,000 wo…Read More

  2. You Thought Ransomware Was Bad

    In the never-ending escalation of cyber threats, an emerging type of attack could dramatically raise the stakes. Called Destruction of Service (DeOS), these attacks could soon become common — and devastating. As outlined in Cisco’s Midyear Cybersecurity Report (download it here), behavior such as locking systems and encrypting data are precursors to DeOS. Right now, federal agencies and other …Read More

  3. News Alert: MBT has acquired the Computer Consulting Division of McGee, Hearne & Paiz LLP

    We are happy to announce, as of June 30, 2017, MBT has acquired the computer consulting division of Cheyenne-based accounting firm McGee, Hearne and & Paiz LLP (MHP). MHP has roots that start back in the 1930's but was officially purchased and branded in September of 2000.  MHP has an A+ BBB service rating and has been loyally serving its customers in the Wyoming and Colorado Area. MHP'…Read More

  4. What is managed services and how can it save my business?

    The term “managed services” is not just a buzzword you might have heard being tossed around at the office. Today, the concept is real and being implemented by companies of all sizes, near and far. So, what is it? Think of managed services as a way for you and your organization to offload all your IT needs and responsibilities onto a service provider. This approach takes the day-to-day IT opera…Read More

  5. Physical Security Isn’t Just Locks on the Doors

    Do you have a computer time out policy that turns off your screen within a few minutes of walking away? Do you have sticky notes on your monitor or passwords under your keyboard? Is your smartphone (with your business email on it) password protected? Are the network jacks in your public areas secure? Are your monitors turned so that the general public walking by in the hall can't see your screens?…Read More

  6. Macs are not immune to Ransomware

      Ransomware as a service software targeting the Mac operating system was recently discovered on the dark web.  For the full article, check out this link http://www.zdnet.com/article/ransomware-as-a-service-schemes-are-now-targeting-macs-too/ to the article by Danny Palmer, June 12, 2017. Many people think they are safer with Mac products, yet new attack software is emerging and is expected …Read More

  7. WannaCry Ransomware’s Real Victim: Your local corner store

    WannaCry ransomware's real victim: Your local corner store Six out of 10 small businesses shut down after cyberattacks. Here's why. by Alfred Ng   May 20, 2017 5:00 AM PDT These businesses may be small, but they're a big draw for hackers. Thanks to WannaCry, ransomware has taken the world by storm, without any discretion on whose computers it holds hostage. It'll lock down hospitals, mailrooms, …Read More

  8. A Note to MBT Customers on Ransomware

    To MBT Customers: If you have the latest patches on your Windows machines, tested backups, and Sophos Intercept X (anti-ransomware product) then you have taken best practices provisions to protect yourself against the new WannaDecrypt0r Ransomware that came out last Friday.  If you are a MBT Total or Proactive Managed Services client then Sophos Intercept X and patches are part of your service wi…Read More