• Home
  • Solutions
    • Managed IT Services
    • Cybersecurity Solutions
    • Data Backup & Recovery
    • Cloud IT Services
    • Support & Maintenance
    • Infrastructure Management
    • VoIP Phone Services
    • Custom Solutions
  • Resources
    • Tech Guides
    • Blog & News
  • Careers
  • Support
  • Get in Touch

Cybersecurity threats are on the rise. Your business is at risk. | Download the Network Security Checklist

Midnight Blue logo
  • Home
  • Solutions
    • Managed IT Services
    • Cybersecurity Solutions
    • Data Backup & Recovery
    • Cloud IT Services
    • Support & Maintenance
    • Infrastructure Management
    • VoIP Phone Services
    • Custom Solutions
  • Resources
    • Tech Guides
    • Blog & News
  • Careers
  • Support
  • Get in Touch

Blog & News

All Categories

All Categories Best Practices Blog Posts Business Case Study Cloud Events MBTS Team Network Security News Security Tech Tips Technology Telephony Uncategorized

Encrypt and Protect Your Data with a VPN

03/16/2018

If you’ve ever felt as though someone was watching what you were doing while you were working remotely, either at home or in public, there’s a chance that you were right. Without a private Internet connection, it is a simple matter for others to watch your processes and steal the data you’re generating. Is there […]

Read More...

Tech Term: HTML vs Plain Text

03/14/2018

As a business owner, we’re sure that you’ve spent some time around computers. You might have even seen the phrases “plain text” and “HTML,” used in regards to email. By understanding what both of these phrases mean, you can improve the way that you understand the technology that your business depends on. The primary difference […]

Read More...

Email Malware is the New Schrodinger’s Cat

03/12/2018

There is a famous thought experiment devised by physicist Erwin Schrodinger, describing a very particular paradox in quantum physics through the experience of a cat. While Schrodinger’s cat was initially intended to demonstrate a very different phenomenon, it can also be applied to something that all businesses need to consider: their email security. Schrodinger devised […]

Read More...

Disasters Come in All Sizes

03/09/2018

Each organization has a different definition for how they define a disaster. One business might feel that they can get away with losing a few files here and there, while another might need every file to be secure and protected against data loss. Regardless, the importance of being able to define the severity of a […]

Read More...

Have You Implemented Email Encryption?

03/07/2018

If you don’t take measures to secure your email, you could potentially give up crucial information to anyone lurking on the same network as you. This is inevitable on public Wi-Fi connections, or anywhere data is in transit. Encryption is the best way to make sure that your organization’s communications are secure, so you absolutely […]

Read More...

1 … 54 55 56 … 101
Midnight Blue logo

Sign Up For Newsletter

Navigate

  • Solutions
  • Company
  • Blog
  • Pittsburgh

Interact

  • Support
  • Pay My Bill
  • Contact

Get Social

  • Facebook
  • Twitter
  • Linkedin

1195 Washington Pike #340, Bridgeville, PA 15017
Midnight Blue Technology Services, LP
412.342.3800

  • Privacy Policy
  • Sitemap