• Skip to main content
CALL US TODAY! 859-245-0582 or Pay Your Bill Online
Next Century Technologies Logo
  • Home
  • Services
    • IT Support
    • Managed Services
    • HIPAA Compliance
    • Bank IT Compliance
    • Managed Services for CPAs
    • Business Continuity and Offsite Backups
    • Voice & Data Cabling
    • Business Phone Systems – VOIP
    • Hardware & Software Sales
    • Web Design and Hosting
    • Public Speaking & Training
  • About
    • Our COVID-19 Policy
    • Careers
  • Blog
  • Contact
×
  • Home
  • Services
    • IT Support
    • Managed Services
    • HIPAA Compliance
    • Bank IT Compliance
    • Managed Services for CPAs
    • Business Continuity and Offsite Backups
    • Voice & Data Cabling
    • Business Phone Systems – VOIP
    • Hardware & Software Sales
    • Web Design and Hosting
    • Public Speaking & Training
  • About
    • Our COVID-19 Policy
    • Careers
  • Blog
  • Contact
Let's Work Together

Blog

Stay up to date in new trends in IT and cyber security. Have an interesting topic you'd like our thoughts on? Get in touch with us today!

Gavel Closeup

Is Your Email Worth Millions?

By Tracy Hardin | August 11, 2020
A recent decision against UnityPoint Health was made where no ‘global cap’ was put in place with regard to settlement claims. These claims against UnityPoint Health stem from data breaches that were a result of two phishing incidents. The class of 1.4 million members are entitled to (up to) $1,000...
Face Mask Emojis

Mask Mandate: Does It Violate HIPAA?

By Tracy Hardin | August 4, 2020
As a business owner or simply a concerned citizen, you will encounter people who object to wearing the mask and may not have one on.  Your first inclination may be to scowl at them for not following the rules, or if you are in a position to do so, demand...
email on laptop screen

What is Spoofing?

By Tracy Hardin | July 23, 2020
Most of us may already know the term spoofing, as it is commonly used in the real-world to describe an alternate variation of something. Spoofing, from a cybercrime standpoint refers to the cybercriminals action to disguise a phone call, website, or email for malicious purposes. By falsifying their true appearance,...
lady looking over shoulder while on laptop

How Do You Protect Your Company from Employee Errors?

By Tracy Hardin | July 20, 2020
Phishing is when a cyberattack is disguised and delivered using email as the carrier or weapon. Through very convincing and cleverly designed messages, the recipient is tricked into believing that the content or sender is authentic, and they then act upon instructions within the message. This means that the sender’s...
random characters appearing on screen like in the matrix

What are Keyloggers?

By Tracy Hardin | July 16, 2020
We take many steps to protect our information and privacy when using devices at home or within the office. However, if your device has a keylogger installed, the data you search, websites you are visiting, and login credentials you are entering can all be easily accessible to a cybercriminal. A...
stay safe - face masks and hand sanitizer

Employee Privacy in a Pandemic

By Tracy Hardin | July 13, 2020
Gathering data for the sake of having data is a mistake that many people make. Effort is put into the research, without a clear idea of how or why you need the information that you’ve put time into gathering. Make sure it is worth it. Additionally, when this is done...
email on phone and photos on laptop

What is Spear Phishing?

By Tracy Hardin | June 22, 2020
While phishing attacks get the most press, spear phishing attacks can be much more dangerous. A phishing email has no intended target and is designed to barrage thousands of endpoints, hoping to get a bite. Spear phishing on the other hand, generally takes a targeted and thoroughly researched approach to...
hand holding credit and debit cards

What is Credit Card Skimming (and how can you protect yourself from it)?

By Tracy Hardin | June 18, 2020
Credit and debit cards are a simple and convenient alternate payment technique in lieu of cash. But, with so much of our financial information residing on these cards, they can be a major liability, if they fall into the wrong hands. Credit card skimmers have been around for years and...
password security checklist in notebook

Changing Our Attitudes About Password Security

By Tracy Hardin | June 15, 2020
Most situations teach us lessons so that we don't repeat damaging behaviors. For example, if you touch a hot stove, you know to pause and make sure it's off before doing it again. If you run out of gas on a highway, on future drives, you'll be on the lookout...
smart watch, tablet and smartphone

Mobile Threats (And How to Avoid Them)

By Tracy Hardin | June 10, 2020
Smartphones and tablets allow us to work from almost any location and improve our quality of life. However, the use of these mobile devices can present significant security challenges from both a personal and professional standpoint. Here are five common threats to watch out for and how to avoid them:...
laptop on desk with work hard anywhere on screen

Cybersecurity in a Changing Work Environment

By Tracy Hardin | June 10, 2020
Things have been pretty crazy these last few months. By no means are we back to normalcy or out of the woods, but there are signs of progress. Regardless of where the next few months or years takes us, there is a clear indication that the landscape of many working...
ransomware - pirate flag on laptop screen

10 Tips to Help Protect Your Organization from Ransomware

By Tracy Hardin | June 9, 2020
Ransomware wreaked havoc among individuals and organizations over the past few years, making a name for itself across the globe. Although the chatter around the malicious software may have quieted down, the threat is very much alive, and working hard to hand out ultimatums to its victims - pay up...
  • « Previous
  • 1
  • 2
  • 3
  • 4
  • Next »

Get In Touch!

859-245-0582

1795 Alysheba Way Unit 5104, Lexington, KY 40509

Click Here to Contact Us

Additional Resources

About
Resources
Privacy Policy

About Us

Since 2001, our goal has been to create a relationship with our partners to provide IT services, becoming a trustworthy asset to support growth of your company.

© 2019 Next Century Technologies. All Rights Reserved.

Let's Work Together!

We're looking forward to helping with your IT needs! Please fill out the form below to get in touch, or call us at 859-245-0582 and we'll help make your technology run smoothly.

  • This field is for validation purposes and should be left unchanged.