• Skip to main content
CALL US TODAY! 859-245-0582 or Pay Your Bill Online
Next Century Technologies Logo
  • Home
  • Services
    • IT Support
    • Managed Services
    • Co-Managed IT Services
    • Cybersecurity
    • HIPAA Compliance
    • Bank IT Compliance
    • Managed Services for CPAs
    • Business Continuity and Offsite Backups
    • Voice & Data Cabling
    • Business Phone Systems – VOIP
    • Hardware & Software Sales
    • Web Design and Hosting
    • Public Speaking & Training
  • About
    • Careers
  • Blog
  • Contact
×
  • Home
  • Services
    • IT Support
    • Managed Services
    • Co-Managed IT Services
    • Cybersecurity
    • HIPAA Compliance
    • Bank IT Compliance
    • Managed Services for CPAs
    • Business Continuity and Offsite Backups
    • Voice & Data Cabling
    • Business Phone Systems – VOIP
    • Hardware & Software Sales
    • Web Design and Hosting
    • Public Speaking & Training
  • About
    • Careers
  • Blog
  • Contact
Let's Work Together

Blog

Stay up to date in new trends in IT and cyber security. Have an interesting topic you'd like our thoughts on? Get in touch with us today!

large pile of money

STOLEN: Laptop Worth $1M!

By Tracy Hardin | September 1, 2020

Was it made of gold? Encrusted in diamonds? No. Read on to learn how one laptop ended up being worth a massive one million dollars.

Read More
hacker wearing skeleton face mask

Fact or Fiction: Pandemic Phishing is on the Rise

By Tracy Hardin | August 28, 2020

It should hardly come as a surprise to anyone that cybercriminal activity has surged in 2020. By May of this year, the number of reported attacks had already come close to the total for 2019 according to the federal government.

Read More
person holding postcard overlooking vacation spot

New Scam Targeting Medical Entities that Your SPAM Filter will NOT Stop!

By Tracy Hardin | August 25, 2020

It’s always nice to get a postcard from friends or family who are away on vacation. But this week we learned of a new kind of postcard being sent out with not-so-well wishes.

Read More
Social Media Apps on Smart Phone

Don’t Forget About Me!

By Tracy Hardin | August 18, 2020

It is easy to get left behind if you become less interesting. No, we aren’t talking about your friends or your childhood toys, although that does happen. We’re talking about YOU. Yes, don’t leave yourself behind. What? How? Explain!

Read More

Is Your Email Worth Millions?

By Tracy Hardin | August 11, 2020

A year of credit monitoring along with identity theft monitoring services. That’s what most of us settle for when we find out that our personal data has been compromised. We are alerted, we change our password, we read the letter that offers these services and may or may not sign up for them.

Some individuals will pursue additional legal action and proceed by taking the company that was responsible for the breach to court for monetary compensation, and some will not pay attention at all.

Read More
Face Mask Emojis

Mask Mandate: Does It Violate HIPAA?

By Tracy Hardin | August 4, 2020

Whatever your opinion is of wearing, or not wearing a mask, there are an increasing number of mandates being put in place by governments or independent establishments in an effort to mitigate the spread of COVID-19. This mask mandate means that most people over a certain age need to have their face covered, including their nose and mouth.

Read More
email on laptop screen

What is Spoofing?

By Tracy Hardin | July 23, 2020

Spoofing is a cybercriminal’s malicious misrepresentation of a phone number, website, or email. By masking their true identity, a cybercriminal is more likely to pull off their scam.

Read More
lady looking over shoulder while on laptop

How Do You Protect Your Company from Employee Errors?

By Tracy Hardin | July 20, 2020

We all know (or should know) that human error accounts for the majority of breaches. Phishing gives hackers entry to a business’s front door by manipulating the employees who work there.

Read More
random characters appearing on screen like in the matrix

What are Keyloggers?

By Tracy Hardin | July 16, 2020

A keylogger is a tool designed to silently spy and record our daily activities on a device. Once a keylogger is installed, it can feed information directly to a cybercriminal in real-time.

Read More
  • « Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 7
  • Next »

Get In Touch!

859-245-0582

1795 Alysheba Way Unit 5104, Lexington, KY 40509

Click Here to Contact Us

Additional Resources

About
Resources
Privacy Policy

About Us

Since 2001, our goal has been to create a relationship with our partners to provide IT services, becoming a trustworthy asset to support growth of your company.

© 2019 Next Century Technologies. All Rights Reserved.

Let's Work Together!

We're looking forward to helping with your IT needs! Please fill out the form below to get in touch, or call us at 859-245-0582 and we'll help make your technology run smoothly.

  • This field is for validation purposes and should be left unchanged.