News + Resources: Our Blog

Information technology news, the latest cybersecurity developments, and more helpful insights.

News + Resources: Our Blog

Information technology news, the latest cybersecurity developments, and more helpful insights.

AI vs. Your Business: Strategies, Tools & Cyberinsurance

AI vs. Your Business: Strategies, Tools & Cyberinsurance

The tools used by cybercriminals have become more sophisticated, more accessible, and easier to use than ever before. What once required deep technical expertise is now available to anyone with internet access. For business owners, this means the threat landscape has...

read more
The Rise of Deepfakes — Is Your Business Prepared?

The Rise of Deepfakes — Is Your Business Prepared?

Deepfake technology isn’t new; it actually started gaining attention just less than a decade ago. However, since then, rapid advancements in AI, coupled with the availability of open-source software and intuitive applications, have accelerated its spread and...

read more
Major Outage Caused by CrowdStrike Falcon Update

Major Outage Caused by CrowdStrike Falcon Update

On July 19, 2024 at 04:09 UTC (12:09am EDT) Crowdstrike, a cybersecurity company, released a patch to their Falcon Sensor product that caused Windows based computers and servers to throw the dreaded Blue Screen of Death (BSOD) making them unusable. This...

read more
How AI Cybersecurity Can Help Protect End Users

How AI Cybersecurity Can Help Protect End Users

From malware to phishing attacks, ransomware, and data breaches, cyber threats are becoming more frequent and sophisticated. Traditional cybersecurity measures, while essential, often can’t keep up with the evolving tactics of cybercriminals. Leveraging artificial...

read more
Zero Trust 101: A Complete Guide for Businesses

Zero Trust 101: A Complete Guide for Businesses

Zero Trust is a security concept that has transformed the way organizations view and implement cybersecurity measures. The notion of Zero Trust is founded on the belief that organizations should not automatically trust anything inside or outside their perimeters;...

read more
The Good, The Bad, and The Ugly of Technology in 2023

The Good, The Bad, and The Ugly of Technology in 2023

As we venture further into the 21st century, technology continues to be an integral part of our daily lives, shaping the way we work, communicate, and live. In 2023, the technological landscape has seen significant advancements and innovations. However, as...

read more
Protect Against Phishing Attacks

Protect Against Phishing Attacks

Phishing attacks are alarmingly common, contributing to 36% of data breaches in 2022. Picture this... You're a seasoned executive, diligently sifting through your inbox after a long day. You spot an email from an employee claiming you've requested an immediate...

read more
4 Reasons for Businesses to Adopt Cloud Backups

4 Reasons for Businesses to Adopt Cloud Backups

The business world continues to find bigger, better ways to embrace technology every day, and for good reason—with apps and work-from-home working models on the rise, organizations of all sizes have to be ready to meet the demand for more advanced IT...

read more
The Dark Web: What Is It, and Why You Should Care?

The Dark Web: What Is It, and Why You Should Care?

The “Dark Web” refers to a part of the internet not indexed by traditional search engines, meaning you can’t just Google “Dark Web” and get in. If your data is currently floating around on the Dark Web now, you have no way of knowing… on your own, that is.

read more
How are Managed IT Services Priced?

How are Managed IT Services Priced?

Is your business considering partnering with an MSP (Managed Services Provider)? After all, you're a team that's accustomed to wearing any hat the situation calls for—why would you want to pay for outsiders coming into your space and touching your...

read more
Watch Out For the Top 3 Phishing Schemes of 2023

Watch Out For the Top 3 Phishing Schemes of 2023

Why is phishing continuously so effective on the general population? Social engineering, and the anonymity of the online world. By appealing to human emotions and dressing your email up with the “right” logos and credentials, people are accustomed to trust, even if it’s a trap.

read more
5 Ways to Stay Cybersafe

5 Ways to Stay Cybersafe

Protecting yourself and your online presence isn’t as much of a monster as it might look.By incorporating cyber hygiene into your day-to-day, whether it be in-office or at home on the couch, you reduce the risk of data and identity theft. And no, doesn’t...

read more
Centriworks Receives RICOH’s Service Excellence Award

Centriworks Receives RICOH’s Service Excellence Award

Centriworks has again been recognized with one of our industry’s most prestigious awards — the RICOH Circle of Excellence. Fewer than 20% of Ricoh’s dealers nationwide have earned this award, and Centriworks is the only Tennessee company recognized. The...

read more
Centriworks Named 2022 Elite Dealer by ENX Magazine

Centriworks Named 2022 Elite Dealer by ENX Magazine

Each year, ENX Magazine judges Elite Dealer applicants on a number of criteria, from technical service excellence to marketing proficiency, growth initiatives, technology leadership, industry accolades, and community philanthropic support. Those dealers chosen are profiled in the December issue of ENX Magazine.

read more
Traveling Safely with a VPN

Traveling Safely with a VPN

Traveling is a great way to experience other cultures, expand your horizons, and make everlasting memories with your loved ones. But for many other reasons, aside from the stress of your flights getting cancelled far away from home and risking the stay at...

read more
4 Reasons Phishing Is Getting More Frequent

4 Reasons Phishing Is Getting More Frequent

Phishing is a social engineering attack used to obtain sensitive information, such as login credentials and payment details, from users. It happens when an attacker, posing as a trusted source, dupes a victim into clicking on a malicious link or...

read more
What is a Dark Web Scan (And How Do I Get One)?

What is a Dark Web Scan (And How Do I Get One)?

When accessing Google, or Bing, or whatever website of your choosing, you’re actually only scratching the surface of the internet, or what we would call the “World Wide Web”. Once you’re past searching through indexes of web pages, you can encounter the “Deep Web,” where a variety of databases holding a multitude of random information are stored.

read more
4 Ways to Create (And Remember) Complex Passwords

4 Ways to Create (And Remember) Complex Passwords

You run a huge risk by using weak, easy-to-remember passwords. You use them because they’re convenient, short, and they expedite how long it takes for you to log into your accounts. But what if we told you that longer, more complex passwords didn’t have to be hard to remember?

read more
Prioritizing Compliance To Limit Liabilities

Prioritizing Compliance To Limit Liabilities

Are you trying to deploy the most affordable technology solution? Chances are it won’t be compliant. Using solutions that do not meet security, encryption and reporting measures outlined by regulations that you are trying to meet (HIPAA, PCI-DSS & GDPR) will make your business non-compliant and violate compliance insurance requirements.

read more
Is Your Small Business Protected?

Is Your Small Business Protected?

The threats to businesses of every type today are so numerous that it can seem like a cyberattack is inevitable. With so many thieves out to steal company data, having as many layers of protection as possible between the data and the thieves is the best...

read more
Cybersecurity Guidelines for Your Small Business

Cybersecurity Guidelines for Your Small Business

You may think it’s not worth their time, but cybercriminals love to target small businesses. These nefarious characters often use small businesses as a gateway to bigger targets. Knowing some cybersecurity basics and putting them in practice will help you protect your business and reduce the risk of a devastating cyber attack.

read more
Centriworks Named 2021 Elite Dealer by ENX Magazine

Centriworks Named 2021 Elite Dealer by ENX Magazine

ENX Magazine, a leading business technology industry magazine has named Centriworks one of its 2021 Elite Dealers. Many factors are considered in choosing the dealers who set themselves apart from the crowd. Our company is honored to be included with the...

read more
Prioritizing Compliance Commitment Across All Work Environments

Prioritizing Compliance Commitment Across All Work Environments

Building and maintaining a secure and compliant work environment can be a long and tedious process, especially given the additional complexities brought about by the ‘new normal’. Remember, compliance includes your remote work environment, too. Therefore, it is only wise to seek help from a partner who has already helped businesses prioritize and achieve undeterred commitment towards compliance.

read more
Tips for Choosing the Right VoIP Phones for Your Team

Tips for Choosing the Right VoIP Phones for Your Team

You may realize that a VoIP phone would be an excellent asset for your company, but you're not sure how to choose the right one. Most of the time, you probably select equipment based on features like price, warranty, and company reputation. But there are a...

read more
Is Your Small Business Protected?

How a ‘Compliance First’ Mindset Limits Liabilities

Are you trying to deploy the most affordable technology solution? Chances are it won’t be compliant. Using solutions that do not meet security, encryption and reporting measures outlined by regulations that you are trying to meet (HIPAA, PCI-DSS &...

read more
15 Ways To Protect Your Business From A Cyberattack!

15 Ways To Protect Your Business From A Cyberattack!

COLONIAL PIPELINE PAYS $5 MILLION TO HACKERS! M.T.A. BREACHED BY HACKERS AS CYBERATTACKS SURGE! RANSOMWARE ATTACK ON JBS PLANTS! These recent headlines are about big companies and organizations, but did you know that 81% of all breaches happen to...

read more
How our clients rated us for 2020

How our clients rated us for 2020

Centriworks is proud to be included in the top 10% of all dealers tracked in North America in our industry. We’ve been honored with CEO Juice’s “Top Ten Service” Award for our service excellence.

read more
Strengthen Your Cybersecurity Strategy for the New Year

Strengthen Your Cybersecurity Strategy for the New Year

Let’s take a look at one tool that can help make your data and network more secure — Managed IT Services. We all know there’s no “shortcut” to a strong data and network security policy, but there are some very simple solutions that can make a big difference without a lot of fuss. Managed IT Services can be a huge help — and here’s why.

read more
Opening Safely in 2021

Opening Safely in 2021

Everyone is hoping to get back to normal in 2021. There are many factors that need to fall into place to help get everyone back to work and school safely during the current pandemic environment. One tool that can help is SENTRYSCAN. This piece of...

read more
Trust East Tennessee’s Only CompTIA Security Trustmark+ Certified Provider

Centriworks Earns CompTIA Security Trustmark+

The CompTIA Security Trustmark+™ is the highest level of recognition for solution providers that consistently follow security best practices, as validated by an independent, third party review of an organization’s overall security posture.

read more

Let’s Connect!

If you’re looking to learn more about the latest technology and cybersecurity, check out our resources:

AI vs. Your Business: Strategies, Tools & Cyberinsurance

AI vs. Your Business: Strategies, Tools & Cyberinsurance

The tools used by cybercriminals have become more sophisticated, more accessible, and easier to use than ever before. What once required deep technical expertise is now available to anyone with internet access. For business owners, this means the threat landscape has...

read more
The Rise of Deepfakes — Is Your Business Prepared?

The Rise of Deepfakes — Is Your Business Prepared?

Deepfake technology isn’t new; it actually started gaining attention just less than a decade ago. However, since then, rapid advancements in AI, coupled with the availability of open-source software and intuitive applications, have accelerated its spread and...

read more

Let’s Connect!

If you’re looking to learn more about the latest technology and cybersecurity, check out our resources: