Male hands using a low profile keyboard, overlaid with tech graphics

Blog

Articles by Function4

Printer Security Vulnerabilities and What You Can Do About It!

August 10th, 2021 by Kevin Box

Cyber security word cloud

On April 29th, 2021, Cyber Criminals were able to hack the largest fuel pipeline in the U.S. because of one password floating around on the dark web, which an employee had previously used to access the organizations' network through a Virtual Private...

Read Full Story »

Posted in: Cybersecurity

Cybersecurity in 2021

August 3rd, 2021 by Kevin Craine

Cybersecurity in 2021

Cybersecurity was a pressing concern even before COVID-19. Now, organizations everywhere must prepare for a new normal that includes increasingly sobering threats to data security. Over the past several months, cyber thieves have become skilled...

Read Full Story »

Posted in: Cybersecurity

Attackers Have Successfully Hit the Nation’s Largest Corporations – Their Onslaught on SMBs Will be Worse – Are You Prepared?

August 2nd, 2021 by Bill Patsouras

Faceless hacker wearing a black hoodie

Leading Managed Technology Services Provider Shares How SMBs Can Protect Themselves from Cyberattacks and Ransomware Threats SUGAR LAND, TX – July 29, 2021 – Function4, a leading managed technology services provider (MTSP), recently shared that some...

Read Full Story »

Posted in: Cybersecurity

Don’t Sleep on HIPAA and Cybersecurity

July 29th, 2021 by Neville M. Bilimoria

HIPAA and Cyber Security

The recent events of the Colonial Pipeline gas shortage in the Southeast have highlighted a very real concern for our nation’s cybersecurity. Cyber criminals are still out there, and seemingly stronger than ever. But in our representation...

Read Full Story »

Posted in: Cybersecurity

Cybersecurity for healthcare systems, medical devices more critical than ever

July 27th, 2021 by Shane Keating and Stephanie Van Ness

Cybersecurity for healthcare systems

Cybercriminals have stepped up their game during the pandemic, launching ransomware attacks at a frenzied pace. In 2020, more than 90 U.S. healthcare organizations reported ransomware attacks, which affected over 600 separate clinics, hospitals and...

Read Full Story »

Posted in: Cybersecurity

6 Ways to Ensure Your Copier and Printer Secures Healthcare Data

July 20th, 2021 by Gabriela Garner

6 Ways to Ensure Your Copier and Printer Secures Healthcare Data

Security breaches create significant problems for any organization. They tax resources, put your reputation in danger and, most of all, cost money. Healthcare organizations are especially vulnerable to security breaches and often have the most to...

Read Full Story »

Posted in: Cybersecurity

Ransomware Struck Another Pipeline Firm—and 70GB of Data Leaked

July 15th, 2021 by Wired

Ransomware Struck Another Pipeline Firm—and 70GB of Data Leaked

LineStar Integrity Services was hacked around the same time as Colonial Pipeline, but radical transparency activists have brought the attack to light. When ransomware hackers hit Colonial Pipeline last month and shut off the distribution of gas along...

Read Full Story »

Posted in: Cybersecurity

Antivirus Software - Explained

July 13th, 2021 by Charlie Osborne

Antivirus software explained

Antivirus software isn’t enough to protect our devices and accounts any longer, but it still provides a key layer of defense. Over the past few years, consumers and enterprises alike have become more aware of the importance of adequate cybersecurity...

Read Full Story »

Posted in: Cybersecurity

The 4 Types of Collaboration Habits That Make Information Security Breaches an Inevitability

June 10th, 2021 by Garrett Hollander

The 4 Types of Collaboration Habits That Make Information Security Breaches an Inevitability

Because of the ongoing COVID-19 pandemic, more people are working remotely than ever before. On the one hand, productivity hasn't really suffered as there are a large number of cloud-based tools that make it possible to be just as productive outside...

Read Full Story »

Posted in: Cybersecurity

Ransomware and Malware Threats: The State of Cybersecurity

June 7th, 2021 by Darcy Mekis

How to Protect Against Malware and Ransomware Threats

Cybersecurity is a growing concern for organizations all over the world. A single attack can lead to thousands or even millions in losses, and cybercriminals continue to come up with more sophisticated methods of attack. Ransomware and malware...

Read Full Story »

Posted in: Cybersecurity

April 2021 Healthcare Data Breach Report

May 26th, 2021 by HIPAA Journal

US healthcare breaches last 12 months

April was another particularly bad month for healthcare data breaches with 62 reported breaches of 500 or – the same number as of March 2021. That is more than 2 reported healthcare data breaches every day, and well over the 12-month average of 51...

Read Full Story »

Posted in: Cybersecurity

Protecting Office Printers and MFPs from Security Risks

May 11th, 2021 by Akisa Matsuda

Protecting Office Printers and MFPs from Security Risks

It is no secret that in this age of new normality, increased security threats such as phishing or ransomware attacks, are a very real concern. Almost all devices are prone to cybersecurity threats and office printers and multifunction devices...

Read Full Story »

Posted in: Cybersecurity

3 Common Security Mistakes When It Comes to Printing in Federal Organizations

March 16th, 2021 by Steve Kelley

Technician getting stressed over server maintenance in server room

In 2019, the online training platform Skillbox sent a rogue print job to unsecured network printers. To do that, they relied on a search tool called Shodan that discovers vulnerable Internet-connected devices. It was the very same tool that a prankster...

Read Full Story »

Posted in: Cybersecurity, Document Management

3 Reasons To Consider a Managed Print Services Program

February 26th, 2021 by Kevin Box

Channeling the benefits of Managed Print Services for SMEs | Channel Pro

Contact a Solutions Expert There was a time in history where the "On-trend" method for managing copier and printer fleets was to map out the office and strategically place workgroup copiers & printers within the office space to maximize...

Read Full Story »

Posted in: Cybersecurity, Business Technology

The Financial Burden of Inadequate IT Services and Security Data Breaches

January 12th, 2021 by Max Queen

data breach laptop

How much will it cost your company to recover following a data breach? New research from IBM Security paints a sobering picture, with costs increasing by 450,000 on average from 2019 to 2020. And here in the U.S., businesses can expect to pay even more...

Read Full Story »

Posted in: Cybersecurity

Cyber Crime is Exploding: How to Protect Your Business

January 6th, 2021 by Max Queen

hacker in the city cybersecurity

Iconic heists have made and destroyed fortunes. They make great scenes for exciting movie plots. Think of Butch Cassidy and his gang blowing up train tracks and fleeing on horseback with $50,000 in cash. Or consider a thief walking out of the Louvre...

Read Full Story »

Posted in: Cybersecurity

Dark Web Scanning: Why Is It Important?

November 11th, 2020 by Ed Hoffmann

Causes of April 2021 Healthcare Data Breaches: Hacking/IT incident, Unauthorized Access/Disclosure, Loss/Theft

DARK WEB SCANNING: WHY IT IS IMPORTANT? Have you heard of the dark web? It’s the hidden part of the internet where the illegal activity takes place online. The dark web has become a hotspot for criminals who want to sell your data. Fortunately, dark...

Read Full Story »

Posted in: Cybersecurity

How Body Temperature Scanning can make your Facility a Safer Environment

October 22nd, 2020 by Josh Chrisman / Kevin Box

US Healthcare data breaches in the past 12 months

When the COVID crises begin early in 2020 and offices started to reopen, many organizations scrambled to put policies and programs to help keep employees and customers safe. If you've recently walked into any public facility, you've probably experienced...

Read Full Story »

Posted in: Cybersecurity

Why Your Company Needs a Mobile Device Management Solution

October 1st, 2020 by Esker

Mobile Device Management

Allowing your employees to use personally-owned mobile devices for work doesn't mean that you have no say in how those devices are used. If you're too hands-off, a simple mistake by an employee could give hackers access to your company's confidential...

Read Full Story »

Posted in: Cybersecurity

Cybersecurity Trends to Know in 2020 & How to Protect Your Business

August 5th, 2020 by Ed Hoffmann

Weekly Cyber Attacks

Organizations today face an ever-increasing number of cyber threats. The rapid growth of criminal software development, coupled with the cybersecurity skills shortage, has also contributed to the rise in cyber-attacks. The COVID-19 pandemic has had...

Read Full Story »

Posted in: Cybersecurity

22 Scary Cybercrime Statistics: What Businesses Need to Know in 2019

July 22nd, 2019 by Function4

cybercrime

Do you worry about a cybersecurity breach impacting your business? These threats to cybersecurity are increasingly common, as hackers become more sophisticated and bolder in their attacks. Data breaches are destructive to your customers and your company’s...

Read Full Story »

Posted in: Cybersecurity

Revenue and Reputation: The Costs of a Cybersecurity Breach

April 29th, 2019 by Function4

cybersecurity crisis

With all of the responsibilities that come with small business ownership, it’s easy to neglect cybersecurity. However, the cost of a data breach is simply too high to ignore. A single data breach could destroy your company’s revenue and reputation —or...

Read Full Story »

Posted in: Cybersecurity

How to Deploy Cybersecurity Awareness Training

April 22nd, 2019 by Function4

cybersecurity awareness training

Your company’s biggest cybersecurity weakness may be your employees. Your staff likely means well, but if they aren’t trained in proper cybersecurity procedures, their innocent errors could cost you a small fortune. But you can keep your company both...

Read Full Story »

Posted in: Cybersecurity

How a Cybersecurity Breach Can Impact Your Business

April 3rd, 2019 by Function4

cybersecurity breach unlocked

When you leave the office each evening, you probably lock the doors and set the security alarm. This seems obvious since you don’t want criminals breaking into your business. But do you treat cyberthreats with the same caution? After all, you probably...

Read Full Story »

Posted in: Cybersecurity

9 Cybersecurity Solutions for Businesses

March 18th, 2019 by Function4

cybersecurity solutions concept

It doesn’t matter if you’re running a small-town business or a large, multinational corporation. If you own a business of any size, you’re at risk for threats such as cyberattacks and data breaches. Cyberthreats do not discriminate. For a business,...

Read Full Story »

Posted in: Cybersecurity

Is Your Business Prepared for Emerging IT Security Threats?

March 13th, 2019 by Function4

security-computer

IT security issues are on every business leader's mind, or they should be. For every high profile cyberattack, there are thousands more that never make the headlines. Where does your company stand? With small and midsize businesses (SMBs) now a favorite...

Read Full Story »

Posted in: Cybersecurity

Cybersecurity: 6 Best Practices for Small Businesses

March 11th, 2019 by Function4

cybersecurity concept

If you’re a small business owner, you probably don’t spend much time thinking about cybersecurity. After all, don’t most cybercriminals focus their efforts on big companies with deep pockets? The truth is, cybercrime presents a genuine threat to your...

Read Full Story »

Posted in: Cybersecurity

Are Your Business Printers Vulnerable to Hackers?

March 6th, 2019 by Kevin Box

woman at office printer secure

In late 2013, hackers breached the systems of Fazio Mechanical Services, a heating and ventilation systems contractor. Through the Fazio Mechanical Services breach, the attackers were able to steal the network credentials of the third-largest U.S. retailer...

Read Full Story »

Posted in: Cybersecurity

Cybersecurity 101: How to Protect Your Business

February 25th, 2019 by Function4

hacker in the city cybersecurity

Iconic heists have made and destroyed fortunes. They make great scenes for exciting movie plots. Think of Butch Cassidy and his gang blowing up train tracks and fleeing on horseback with $50,000 in cash. Or consider a thief walking out of the Louvre...

Read Full Story »

Posted in: Cybersecurity

How Our View of Information Security is Evolving with Technology

February 18th, 2019 by Brad Yocum

digital workplace concept-1

I began my career as a young 20-year-old in the mid-1990s working in the copy, print and imaging industry. At the time, office technology was just in its infancy. Creating a duplicate copy of an image was cutting edge. Sending pictures via fax was innovative....

Read Full Story »

Posted in: Cybersecurity

AI Attacks May Be Your Organization's Next IT Security Concern

February 13th, 2019 by Function4

Artificial Intelligence (AI) attack

Mass-scale AI-driven cyberattacks could be headed your way soon. Artificial intelligence (AI) is already effectively deployed as a way to detect malware and combat spam, so it stands to reason that AI will soon be a favored tool for hackers. With AI...

Read Full Story »

Posted in: Cybersecurity

SMBs Are a Hacker’s Ideal Target – Is Your Business Safe?

January 28th, 2019 by Function4

Cyber Attack News Article: Who Needs Cybersecurity - SMBs

Data breaches are a company’s biggest fear. If you own a company, the thought of someone stealing your data is probably enough to make you want to cut the cord and take your company offline. Of course, this isn’t practical in today’s economy, as computers...

Read Full Story »

Posted in: Cybersecurity

Protecting Your Company From Social Engineering Attacks

October 8th, 2018 by Function4

social engineering phone

Social engineering has been around since the first traveling hucksters pitched miracle cures from the back of horse-drawn wagons. Today's social engineering schemes may be a little more sophisticated, but they have the same result—very embarrassed victims...

Read Full Story »

Posted in: Cybersecurity

Protect Your Data with a Mobile Device Management Solution

July 9th, 2018 by Function4

mobile device management

A recent international survey by Check Point Software Technologies made it clear that businesses must step up their game when it comes to mobile device management. Their unsettling research of 850 firms revealed: No business was left untouched—each...

Read Full Story »

Posted in: Cybersecurity

The IT Security Threat Right Under Your Nose

June 11th, 2018 by Function4

it security

With security breaches continuously on the rise, SMBs have been unable to escape the fallout. In fact, more than 60% of small businesses were the victim of some form of cybercrime in 2017. Since you would rather be in the 40% of companies who didn't...

Read Full Story »

Posted in: Cybersecurity

Mobile Device Management: Enabling Mobile Printing

June 4th, 2018 by Function4

mobile device management

When it comes to managing your mobile devices, you've got a lot to focus on--but one thing you definitely won't want to overlook is mobile printing. This solution is innovative, flexible, and efficient, and it makes a great addition to any mobile fleet....

Read Full Story »

Posted in: Cybersecurity