Cybersecurity Maturity Model Certification (CMMC) Basics
CMMC Compliance Basics and Need to Know Information CMMC (Cybersecurity Maturity Model Certification) is a standard that is being implemented across Defense Industrial Base (DIB). The standards are exactly what it sounds like, a framework that both effects the security of a company within its technical infrastructure as well as the business’ operational structure. These […]
Wire Transfer Scams
All About the Wire Transfer Scam If you have not heard of the Wire Transfer Scam, consider yourself lucky. In our world, we hear about these scams weekly. Unfortunately, once the scammer has succeeded, there is not much that our company can do except for work with the FBI on the investigation. While this […]
IT Support Options for Your Business
Break/Fix “Pay-as-you-go,” “Cash Basis,” “Block Hours,” or as the industry calls it, “Break/Fix,” are all the same idea. Something in the IT realm breaks, you create a ticket with your IT Company, and they fix it. Then, the hours used to fix the issue is charged to you, either in a pay-as-you-go model or charged […]
Securing Your Network With Multi-Factor Authentication
All companies want to ensure that their data is secure and private. While we do not imagine that a cyberattack could happen to our business, it is extremely possible without the proper security measures in place. Therefore, you should focus on your cybersecurity and secure your network with multi-factor authentication. Cyberattack on The Colonial Pipeline […]
Active Security
The CEO and COO of Hill Country Tech Guys, Whit and Sara Ehrich, discuss security needs, the cyber-attack lifecycle, and some examples of what this looks like. Whit’s 20 years of experience in a variety of IT infrastructures gives him insight as to what security measures a company needs to protect their data from cyber-attacks. […]
Cyber Security
This webinar on cyber security allows Whit to discuss the changes we’ve been making and implementing into our customer’s security plans. Whit uses his 20 years of experience in the IT market to educate viewers on: Phishing attempts and training your employees on how to spot them DNS Scanning and Filtering Dark Web Scanning and […]
How to Best Leverage Your IT
In this month’s webinar, Sara takes over and discusses the operational side of IT. With her experience in IT customer relations and operations, Sara educates viewers on: How to strategically leverage your business Business and technology strategies need to align What to do when business strategies are not aligning Strategic IT meetings, and what they […]
Cloud Computing Webinar
Securing your Work Environment
In this month’s webinar Whit brings his 20 years of experience, in a wide variety of IT infrastructures and markets to provide possible security solutions for business leaders to make informed IT decisions in order to meet their business goals. Our intentions behind these webinars are to collaborate and share information from our experience in […]