• Home
  • Solutions
    • Managed IT Services
    • Cybersecurity Solutions
    • Data Backup & Recovery
    • Cloud IT Services
    • Support & Maintenance
    • Infrastructure Management
    • VoIP Phone Services
    • Custom Solutions
  • Resources
    • Tech Guides
    • Blog & News
  • Careers
  • Support
  • Get in Touch

Cybersecurity threats are on the rise. Your business is at risk. | Download the Network Security Checklist

Midnight Blue logo
  • Home
  • Solutions
    • Managed IT Services
    • Cybersecurity Solutions
    • Data Backup & Recovery
    • Cloud IT Services
    • Support & Maintenance
    • Infrastructure Management
    • VoIP Phone Services
    • Custom Solutions
  • Resources
    • Tech Guides
    • Blog & News
  • Careers
  • Support
  • Get in Touch

Blog & News

All Categories

All Categories Best Practices Blog Posts Business Case Study Cloud Events MBTS Team Network Security News Security Tech Tips Technology Telephony Uncategorized

Employees, The Home and Network Security

12/14/2020

While most employees know never to use a public wifi in places such as a coffee shop, they tend to think that they are safe within their own home. Regrettably, this is not the case. Hackers and cybercriminals can be next door, in the driveway or even visitors. Therefore, any employee working remotely needs to […]

Read More...

MidnightBlue Employee Spotlight: Jake Rubenstein

12/03/2020

Jake at Work Jake Rubenstein has been on the MidnightBlue team for a whopping 30 days now as a Business Development Manager. His co-workers describe him as trustworthy and a real team player. His favorite thing about working at MidnightBlue thus far is the overall experience of how both clients and employees are managed and […]

Read More...

How to Keep Your Mobile Device Secure

11/11/2020

Why Does My Mobile Device Need to be Secure? Your mobile devices need security measures in place, just as your computer does. This includes your smartphones, tablets, and wearables. All are vulnerable to cyberattacks as well as theft. They can be hacked, have malware installed, and now, phishing attempts are appearing in messages. Typically, most […]

Read More...

Video Conferencing Security Best Practices for Your Organization

Has there ever been a technology more beneficial to business continuity than video conferencing? It’s one thing to talk over the phone, through email, or via messaging, but it’s a dramatic difference to have face-to-face communication that reflects the comradery of speaking in person. Of course, as with any emerging technology, mistakes have occurred since […]

Read More...

What We Can Learn from the History of Cyberattacks

11/09/2020

Since the dawn of the computer age, people have been trying to steal electronic information. First, it was massive mainframe computers. These were the targets of both sides of the Cold War. International electronic espionage was not just found in spy novels but was a breathing reality. Both sides were trying to infiltrate the computers […]

Read More...

1 … 7 8 9 … 98
Midnight Blue logo

Sign Up For Newsletter

Navigate

  • Solutions
  • Company
  • Blog
  • Pittsburgh

Interact

  • Support
  • Pay My Bill
  • Contact

Get Social

  • Facebook
  • Twitter
  • Linkedin

1195 Washington Pike, Suite 340, Bridgeville, PA 15017
Midnight Blue Technology Services, LP
412.342.3800

  • Privacy Policy
  • Sitemap