News + Resources: Our Blog

Information technology news, the latest cybersecurity developments, and more helpful insights.

News + Resources: Our Blog

Information technology news, the latest cybersecurity developments, and more helpful insights.

The Good, The Bad, and The Ugly of Technology in 2023

The Good, The Bad, and The Ugly of Technology in 2023

As we venture further into the 21st century, technology continues to be an integral part of our daily lives, shaping the way we work, communicate, and live. In 2023, the technological landscape has seen significant advancements and innovations. However, as...

read more
Protect Against Phishing Attacks

Protect Against Phishing Attacks

Phishing attacks are alarmingly common, contributing to 36% of data breaches in 2022. Picture this... You're a seasoned executive, diligently sifting through your inbox after a long day. You spot an email from an employee claiming you've requested an immediate...

read more
4 Reasons for Businesses to Adopt Cloud Backups

4 Reasons for Businesses to Adopt Cloud Backups

The business world continues to find bigger, better ways to embrace technology every day, and for good reason—with apps and work-from-home working models on the rise, organizations of all sizes have to be ready to meet the demand for more advanced IT...

read more
The Dark Web: What Is It, and Why You Should Care?

The Dark Web: What Is It, and Why You Should Care?

The “Dark Web” refers to a part of the internet not indexed by traditional search engines, meaning you can’t just Google “Dark Web” and get in. If your data is currently floating around on the Dark Web now, you have no way of knowing… on your own, that is.

read more
How are Managed IT Services Priced?

How are Managed IT Services Priced?

Is your business considering partnering with an MSP (Managed Services Provider)? After all, you're a team that's accustomed to wearing any hat the situation calls for—why would you want to pay for outsiders coming into your space and touching your...

read more
Watch Out For the Top 3 Phishing Schemes of 2023

Watch Out For the Top 3 Phishing Schemes of 2023

Why is phishing continuously so effective on the general population? Social engineering, and the anonymity of the online world. By appealing to human emotions and dressing your email up with the “right” logos and credentials, people are accustomed to trust, even if it’s a trap.

read more
5 Ways to Stay Cybersafe

5 Ways to Stay Cybersafe

Protecting yourself and your online presence isn’t as much of a monster as it might look.By incorporating cyber hygiene into your day-to-day, whether it be in-office or at home on the couch, you reduce the risk of data and identity theft. And no, doesn’t...

read more
Centriworks Receives RICOH’s Service Excellence Award

Centriworks Receives RICOH’s Service Excellence Award

Centriworks has again been recognized with one of our industry’s most prestigious awards — the RICOH Circle of Excellence. Fewer than 20% of Ricoh’s dealers nationwide have earned this award, and Centriworks is the only Tennessee company recognized. The...

read more
Centriworks Named 2022 Elite Dealer by ENX Magazine

Centriworks Named 2022 Elite Dealer by ENX Magazine

Each year, ENX Magazine judges Elite Dealer applicants on a number of criteria, from technical service excellence to marketing proficiency, growth initiatives, technology leadership, industry accolades, and community philanthropic support. Those dealers chosen are profiled in the December issue of ENX Magazine.

read more
What is a vCIO and How Should You Budget for Your IT Expenses?

What is a vCIO and How Should You Budget for Your IT Expenses?

A ”Virtual" Chief Information Officer (vCIO) provides recommendations on the best way to develop and implement an organization's IT strategy. A vCIO works with the CEO and other executives to ensure that the company's IT needs are being met and that its IT budget is...

read more
Traveling Safely with a VPN

Traveling Safely with a VPN

Traveling is a great way to experience other cultures, expand your horizons, and make everlasting memories with your loved ones. But for many other reasons, aside from the stress of your flights getting cancelled far away from home and risking the stay at...

read more
4 Reasons Phishing Is Getting More Frequent

4 Reasons Phishing Is Getting More Frequent

Phishing is a social engineering attack used to obtain sensitive information, such as login credentials and payment details, from users. It happens when an attacker, posing as a trusted source, dupes a victim into clicking on a malicious link or...

read more
What is a Dark Web Scan (And How Do I Get One)?

What is a Dark Web Scan (And How Do I Get One)?

When accessing Google, or Bing, or whatever website of your choosing, you’re actually only scratching the surface of the internet, or what we would call the “World Wide Web”. Once you’re past searching through indexes of web pages, you can encounter the “Deep Web,” where a variety of databases holding a multitude of random information are stored.

read more
NEWS: Google Chrome & Microsoft Edge Hacked

NEWS: Google Chrome & Microsoft Edge Hacked

Google has issued an alert warning billions of Chrome users that the browser has been successfully targeted by hackers. The same attack also affects Microsoft Edge. Here’s what you need to know.

read more
4 Ways to Create (And Remember) Complex Passwords

4 Ways to Create (And Remember) Complex Passwords

You run a huge risk by using weak, easy-to-remember passwords. You use them because they’re convenient, short, and they expedite how long it takes for you to log into your accounts. But what if we told you that longer, more complex passwords didn’t have to be hard to remember?

read more
Prioritizing Compliance To Limit Liabilities

Prioritizing Compliance To Limit Liabilities

Are you trying to deploy the most affordable technology solution? Chances are it won’t be compliant. Using solutions that do not meet security, encryption and reporting measures outlined by regulations that you are trying to meet (HIPAA, PCI-DSS & GDPR) will make your business non-compliant and violate compliance insurance requirements.

read more
Is Your Small Business Protected?

Is Your Small Business Protected?

The threats to businesses of every type today are so numerous that it can seem like a cyberattack is inevitable. With so many thieves out to steal company data, having as many layers of protection as possible between the data and the thieves is the best...

read more
Cybersecurity Guidelines for Your Small Business

Cybersecurity Guidelines for Your Small Business

You may think it’s not worth their time, but cybercriminals love to target small businesses. These nefarious characters often use small businesses as a gateway to bigger targets. Knowing some cybersecurity basics and putting them in practice will help you protect your business and reduce the risk of a devastating cyber attack.

read more
Centriworks Named 2021 Elite Dealer by ENX Magazine

Centriworks Named 2021 Elite Dealer by ENX Magazine

ENX Magazine, a leading business technology industry magazine has named Centriworks one of its 2021 Elite Dealers. Many factors are considered in choosing the dealers who set themselves apart from the crowd. Our company is honored to be included with the...

read more
Prioritizing Compliance Commitment Across All Work Environments

Prioritizing Compliance Commitment Across All Work Environments

Building and maintaining a secure and compliant work environment can be a long and tedious process, especially given the additional complexities brought about by the ‘new normal’. Remember, compliance includes your remote work environment, too. Therefore, it is only wise to seek help from a partner who has already helped businesses prioritize and achieve undeterred commitment towards compliance.

read more
Tips for Choosing the Right VoIP Phones for Your Team

Tips for Choosing the Right VoIP Phones for Your Team

You may realize that a VoIP phone would be an excellent asset for your company, but you're not sure how to choose the right one. Most of the time, you probably select equipment based on features like price, warranty, and company reputation. But there are a...

read more
Is Your Small Business Protected?

How a ‘Compliance First’ Mindset Limits Liabilities

Are you trying to deploy the most affordable technology solution? Chances are it won’t be compliant. Using solutions that do not meet security, encryption and reporting measures outlined by regulations that you are trying to meet (HIPAA, PCI-DSS &...

read more
15 Ways To Protect Your Business From A Cyberattack!

15 Ways To Protect Your Business From A Cyberattack!

COLONIAL PIPELINE PAYS $5 MILLION TO HACKERS! M.T.A. BREACHED BY HACKERS AS CYBERATTACKS SURGE! RANSOMWARE ATTACK ON JBS PLANTS! These recent headlines are about big companies and organizations, but did you know that 81% of all breaches happen to...

read more
How our clients rated us for 2020

How our clients rated us for 2020

Centriworks is proud to be included in the top 10% of all dealers tracked in North America in our industry. We’ve been honored with CEO Juice’s “Top Ten Service” Award for our service excellence.

read more
Strengthen Your Cybersecurity Strategy for the New Year

Strengthen Your Cybersecurity Strategy for the New Year

Let’s take a look at one tool that can help make your data and network more secure — Managed IT Services. We all know there’s no “shortcut” to a strong data and network security policy, but there are some very simple solutions that can make a big difference without a lot of fuss. Managed IT Services can be a huge help — and here’s why.

read more
Opening Safely in 2021

Opening Safely in 2021

Everyone is hoping to get back to normal in 2021. There are many factors that need to fall into place to help get everyone back to work and school safely during the current pandemic environment. One tool that can help is SENTRYSCAN. This piece of...

read more
Trust East Tennessee’s Only CompTIA Security Trustmark+ Certified Provider

Centriworks Earns CompTIA Security Trustmark+

The CompTIA Security Trustmark+™ is the highest level of recognition for solution providers that consistently follow security best practices, as validated by an independent, third party review of an organization’s overall security posture.

read more
6 Personal Cybersecurity Tips

6 Personal Cybersecurity Tips

Cybersecurity is a full time job for me and the things I learn through my work I really try to implement in my personal life. I got to thinking that there can never be enough cyber tips for home users and some guidance there is always helpful because that’s where each of us live. Just a few easy changes can make a world of difference so I put together a few tips that should payoff big for home users.

read more
Four Factors to Consider with Business Continuity Planning

Four Factors to Consider with Business Continuity Planning

Do you have employees working from home? Do you rely on video conferencing to meet with clients and fellow team members? When looking at a Business Continuity Plan, here are four factors to keep in mind that will help keep your organization running smoothly, even when the unexpected changes how we work.

read more
One Important Tool for Opening Offices and Schools Safely

One Important Tool for Opening Offices and Schools Safely

These devices are invaluable to help prevent virus spread and maintain a healthy environment for your employees, associates, visitors and the general public. With them, organizations can vet staff members and the public before entry to public and private premises such as office buildings, manufacturing plants, healthcare settings, supermarkets, factories, transport hubs, schools, and hotels.

read more
How to Avoid Scams that Target Small Business

How to Avoid Scams that Target Small Business

Learning how to avoid scams in a small business can save you a lot of money and time. Scammers have specific tactics they use to social engineer you and your staff into doing what they want. You need to know what those tactics are and what to look for to avoid being sucked in to the scam.

read more

Let’s Connect!

If you’re looking to learn more about the latest technology and cybersecurity, check out our resources:

Let’s Connect!

If you’re looking to learn more about the latest technology and cybersecurity, check out our resources: