10 Cyber Readiness Strategies

Having a cyber readiness plan that includes prevention, continuity, and recovery strategies will give you a much better chance against cyber threats.
5 Ways to Balance User Productivity with Solid Authentication Protocols

One constant struggle in offices is the balance between productivity and security. If you give users too much freedom
4 Practical Steps for Vendor Cloud Backup

4 Practical Steps for Cloud Backup When you entrust your business data to a cloud-based platform, you expect it to be safe and sound. However, […]
4 Core Benefits of Cloud Backup

If you rely on cloud-based solutions, use a good backup—and use it frequently. Here are some of the core cloud backup benefits…
Put Cloud Backup on Your Nice List

It’s so important to have a data backup strategy in place. By backing up your data regularly, you can protect yourself from…
Myths about Cloud Backup platforms

Myths about Cloud Backup Platforms Your data is essential for your business’s success. There’s no doubt about it in the modern digitized era. However, not […]
What Every Small Business Should Know About Phishing

About Acumen We are a TOP FIVE Managed IT Services provider in St. Louis, Missouri, working to empower businesses to achieve their goals by leveraging […]
How to Prevent Ransomware from Entering Your Business

About Acumen We are a TOP FIVE Managed IT Services provider in St. Louis, Missouri, working to empower businesses to achieve their goals by leveraging […]
Four Employee Cyberthreat Traits

Four Employee Cyberthreat Traits To succeed in today’s modern competitive business landscape, you need to understand the strengths and weaknesses of your employees. This will […]
Four Cyberthreats Small Businesses Need to Know

Four Cyberthreats Small Businesses Need to Know Data breaches have become more common in recent years, owing primarily to the rapid emergence of new threats. […]
Why Passwords are Your Business’s Weakest Point

Why Passwords are Your Business’s Weakest Point In today’s digital world, safeguarding your organization’s online assets is critical. Unfortunately, poor password hygiene practices by some […]
Four Popular Cybersecurity Myths Busted

Four Popular Cybersecurity Myths Busted As the business world becomes increasingly digitized, you’ll have to tackle several dangers that come with doing business online. Cybercriminals […]
Cyber insurance companies insisting on MFA… and so should you

In what may be one of the first court filings of its kind, insurer Travelers is asking a district court for a ruling to rescind a policy because the insured allegedly misrepresented its use of multifactor authentication (MFA) – a condition to get cyber coverage.
Cybersecurity Awareness Training refresher courses: How often?

Cybersecurity Awareness Training is vital to a secure business. How often do employees need a refresher course to stay on top of their game?
Small Business Cybersecurity – Video

Outsourcing IT Services for Small Businesses – Video: Learn about why smart businesses outsource their IT in this short video.
SECURITY ALERT: Zoom Flaws Could Allow Attacks

Four Zoom flaws found that could be used by hackers to send malicious code. Read more about what’s being done to stop them.
HIGH SECURITY ALERT: Microsoft Shares Mitigation for Office Vulnerability

Microsoft has developed mitigation after an Office zero-day flaw was unearthed that could be used to execute malicious code remotely.
CRITICAL SECURITY ALERT: Russian Cyberattacks Headed Our Way

CRITICAL SECURITY ALERT: Russian Cyberattacks Headed Our Way Acumen has observed Russian cyberattacks that attempt to overwhelm business firewalls. The attacker makes thousands of requests […]
SECURITY ALERT: LinkedIn Impersonation On The Rise In Phishing Attacks

LinkedIn impersonation: LinkedIn is now the most-impersonated brand in phishing attack attempts. Here’s how you can protect yourself.
CRITICAL IT ALERT: Do you have an ASUS Router? Read this and act now.

Cyclops Blink botnet is now targeting Asus routers in a new wave of cyberattacks. Here’s what you need to do if you have one.
CRITICAL SECURITY ALERT: APC Smart-UPS Device Vulnerability

CRITICAL SECURITY ALERT: High-have been disclosed in APC Smart-UPS devices Three high-impact APC Smart-UPS device vulnerabilities have been disclosed that could be abused by remote adversaries […]
SECURITY ALERT: Update your Samsung Phone

Samsung Galaxy update needed after phones affected by flawed hardware encryption feature. Here’s what to do.
SECURITY ALERT: Cyber Criminals mailing out USB Drives that install Ransomware

A cybercrime group has been mailing out USB thumb drives in the hope that recipients will plug them into their PCs and install ransomware.
Security & Windows 11 – Intro

Your Security is vitally important At Acumen, we take your security seriously. Acumen Implementing New Security Services, Recommending Windows 11 Upgrade In response to escalating […]
Windows 11 – Chapter 3

Windows 11 Hardware Recommendations Schedule a Free Consultation Chapter 3: Windows 11 Hardware Recommendations Hardware Requirements Acumen Managed Services Clients: Please check your inbox for […]
Windows 11 Security – Chapter 1

Windows 11: Should you upgrade to Windows 11? Chapter One: Security Unlike Anything Before. Microsoft is making an aggressive…
Windows 11 – Chapter 2

Should You Upgrade to Windows 11? Here’s what you need to know about the User Experience Chapter 1: Security unlike anything before Chapter 2: Windows […]