News + Resources: Our Blog

Information technology news, the latest cybersecurity developments, and more helpful insights.

News + Resources: Our Blog

Information technology news, the latest cybersecurity developments, and more helpful insights.

Centriworks Named 2022 Elite Dealer by ENX Magazine

Centriworks Named 2022 Elite Dealer by ENX Magazine

Each year, ENX Magazine judges Elite Dealer applicants on a number of criteria, from technical service excellence to marketing proficiency, growth initiatives, technology leadership, industry accolades, and community philanthropic support. Those dealers chosen are profiled in the December issue of ENX Magazine.

read more
What is a vCIO and How Should You Budget for Your IT Expenses?

What is a vCIO and How Should You Budget for Your IT Expenses?

A ”Virtual" Chief Information Officer (vCIO) provides recommendations on the best way to develop and implement an organization's IT strategy. A vCIO works with the CEO and other executives to ensure that the company's IT needs are being met and that its IT budget is...

read more
Traveling Safely with a VPN

Traveling Safely with a VPN

Traveling is a great way to experience other cultures, expand your horizons, and make everlasting memories with your loved ones. But for many other reasons, aside from the stress of your flights getting cancelled far away from home and risking the stay at...

read more
4 Reasons Phishing Is Getting More Frequent

4 Reasons Phishing Is Getting More Frequent

Phishing is a social engineering attack used to obtain sensitive information, such as login credentials and payment details, from users. It happens when an attacker, posing as a trusted source, dupes a victim into clicking on a malicious link or...

read more
What is a Dark Web Scan (And How Do I Get One)?

What is a Dark Web Scan (And How Do I Get One)?

When accessing Google, or Bing, or whatever website of your choosing, you’re actually only scratching the surface of the internet, or what we would call the “World Wide Web”. Once you’re past searching through indexes of web pages, you can encounter the “Deep Web,” where a variety of databases holding a multitude of random information are stored.

read more
NEWS: Google Chrome & Microsoft Edge Hacked

NEWS: Google Chrome & Microsoft Edge Hacked

Google has issued an alert warning billions of Chrome users that the browser has been successfully targeted by hackers. The same attack also affects Microsoft Edge. Here’s what you need to know.

read more
4 Ways to Create (And Remember) Complex Passwords

4 Ways to Create (And Remember) Complex Passwords

You run a huge risk by using weak, easy-to-remember passwords. You use them because they’re convenient, short, and they expedite how long it takes for you to log into your accounts. But what if we told you that longer, more complex passwords didn’t have to be hard to remember?

read more
Prioritizing Compliance To Limit Liabilities

Prioritizing Compliance To Limit Liabilities

Are you trying to deploy the most affordable technology solution? Chances are it won’t be compliant. Using solutions that do not meet security, encryption and reporting measures outlined by regulations that you are trying to meet (HIPAA, PCI-DSS & GDPR) will make your business non-compliant and violate compliance insurance requirements.

read more
Is Your Small Business Protected?

Is Your Small Business Protected?

The threats to businesses of every type today are so numerous that it can seem like a cyberattack is inevitable. With so many thieves out to steal company data, having as many layers of protection as possible between the data and the thieves is the best...

read more
Cybersecurity Guidelines for Your Small Business

Cybersecurity Guidelines for Your Small Business

You may think it’s not worth their time, but cybercriminals love to target small businesses. These nefarious characters often use small businesses as a gateway to bigger targets. Knowing some cybersecurity basics and putting them in practice will help you protect your business and reduce the risk of a devastating cyber attack.

read more
Centriworks Named 2021 Elite Dealer by ENX Magazine

Centriworks Named 2021 Elite Dealer by ENX Magazine

ENX Magazine, a leading business technology industry magazine has named Centriworks one of its 2021 Elite Dealers. Many factors are considered in choosing the dealers who set themselves apart from the crowd. Our company is honored to be included with the...

read more
Prioritizing Compliance Commitment Across All Work Environments

Prioritizing Compliance Commitment Across All Work Environments

Building and maintaining a secure and compliant work environment can be a long and tedious process, especially given the additional complexities brought about by the ‘new normal’. Remember, compliance includes your remote work environment, too. Therefore, it is only wise to seek help from a partner who has already helped businesses prioritize and achieve undeterred commitment towards compliance.

read more
Tips for Choosing the Right VoIP Phones for Your Team

Tips for Choosing the Right VoIP Phones for Your Team

You may realize that a VoIP phone would be an excellent asset for your company, but you're not sure how to choose the right one. Most of the time, you probably select equipment based on features like price, warranty, and company reputation. But there are a...

read more
Is Your Small Business Protected?

How a ‘Compliance First’ Mindset Limits Liabilities

Are you trying to deploy the most affordable technology solution? Chances are it won’t be compliant. Using solutions that do not meet security, encryption and reporting measures outlined by regulations that you are trying to meet (HIPAA, PCI-DSS &...

read more
15 Ways To Protect Your Business From A Cyberattack!

15 Ways To Protect Your Business From A Cyberattack!

COLONIAL PIPELINE PAYS $5 MILLION TO HACKERS! M.T.A. BREACHED BY HACKERS AS CYBERATTACKS SURGE! RANSOMWARE ATTACK ON JBS PLANTS! These recent headlines are about big companies and organizations, but did you know that 81% of all breaches happen to...

read more
How our clients rated us for 2020

How our clients rated us for 2020

Centriworks is proud to be included in the top 10% of all dealers tracked in North America in our industry. We’ve been honored with CEO Juice’s “Top Ten Service” Award for our service excellence.

read more
Strengthen Your Cybersecurity Strategy for the New Year

Strengthen Your Cybersecurity Strategy for the New Year

Let’s take a look at one tool that can help make your data and network more secure — Managed IT Services. We all know there’s no “shortcut” to a strong data and network security policy, but there are some very simple solutions that can make a big difference without a lot of fuss. Managed IT Services can be a huge help — and here’s why.

read more
Opening Safely in 2021

Opening Safely in 2021

Everyone is hoping to get back to normal in 2021. There are many factors that need to fall into place to help get everyone back to work and school safely during the current pandemic environment. One tool that can help is SENTRYSCAN. This piece of...

read more
Trust East Tennessee’s Only CompTIA Security Trustmark+ Certified Provider

Centriworks Earns CompTIA Security Trustmark+

The CompTIA Security Trustmark+™ is the highest level of recognition for solution providers that consistently follow security best practices, as validated by an independent, third party review of an organization’s overall security posture.

read more
6 Personal Cybersecurity Tips

6 Personal Cybersecurity Tips

Cybersecurity is a full time job for me and the things I learn through my work I really try to implement in my personal life. I got to thinking that there can never be enough cyber tips for home users and some guidance there is always helpful because that’s where each of us live. Just a few easy changes can make a world of difference so I put together a few tips that should payoff big for home users.

read more
Four Factors to Consider with Business Continuity Planning

Four Factors to Consider with Business Continuity Planning

Do you have employees working from home? Do you rely on video conferencing to meet with clients and fellow team members? When looking at a Business Continuity Plan, here are four factors to keep in mind that will help keep your organization running smoothly, even when the unexpected changes how we work.

read more
One Important Tool for Opening Offices and Schools Safely

One Important Tool for Opening Offices and Schools Safely

These devices are invaluable to help prevent virus spread and maintain a healthy environment for your employees, associates, visitors and the general public. With them, organizations can vet staff members and the public before entry to public and private premises such as office buildings, manufacturing plants, healthcare settings, supermarkets, factories, transport hubs, schools, and hotels.

read more
How to Avoid Scams that Target Small Business

How to Avoid Scams that Target Small Business

Learning how to avoid scams in a small business can save you a lot of money and time. Scammers have specific tactics they use to social engineer you and your staff into doing what they want. You need to know what those tactics are and what to look for to avoid being sucked in to the scam.

read more
Strengthen Your Cybersecurity Strategy for the New Year

Small Business Cybersecurity Guidelines

Cyber criminals target companies of all sizes. Knowing some cybersecurity basics and putting them in practice will help you protect your business and reduce the risk of a cyber attack.

read more
Ransomware Has a New Trick

Ransomware Has a New Trick

The economics of crippling a business’ infrastructure and extorting money from them wasn’t as lucrative as the thieves had hoped, so now they have designed ransomware with a twist and included a new trick.

read more
Is it time to switch your Managed IT provider?

Is it time to switch your Managed IT provider?

After implementing managed IT, your business should see notable benefits, including cost savings, employee efficiency (and savings on staff time), better IT communication and programs, increased protection, and more advanced proactive assessments. If this...

read more
Why is Cybersecurity So Important, Anyway?

Why is Cybersecurity So Important, Anyway?

We all know that cybersecurity is a huge deal in the business world–but do you know exactly why you spend so much time, money, and energy worrying about it? Today we’ll review all the reasons why cybersecurity is always worth it.

read more
The Miracle of Mobile Document Management

The Miracle of Mobile Document Management

Not many business solutions can be called a “miracle,” but mobile document management fits the definition. Read on to find out why this solution might be the best thing that ever happened to your company!

read more
The Top 4 Reasons to Choose a VoIP Phone System

How to Protect Your VoIP Phone System from Hackers

Communication is essential to all companies, and regularly updating your processes is essential. VoIP is a game-changer for companies looking for collaborative solutions for the digital workplace. It’s not hard to see why it makes more sense for businesses to invest in the service than to continue using traditional services that aren’t network-enabled or nearly as connected.

read more
Doing Document Management The Right Way

Doing Document Management The Right Way

Document management software is key to ensuring protection against cyberattacks and those destined to hack your network with ill-intent. Productivity increases with a well-established document management system that saves time and money.

read more
The Challenges of In-House Managed IT Services

The Challenges of In-House Managed IT Services

Today, IT services are vital for everyday operations in virtually every business of every size. However, having in-house managed IT services can be difficult and expensive for many companies. However, there is an easier way.

read more
Protecting Your Customer Data With Cybersecurity

Protecting Your Customer Data With Cybersecurity

Customer data has always been valuable, but in today’s market, it is more valuable than ever. It’s so valuable that there are many people around the world trying to get it from businesses just like yours. Here’s how you can keep customer data more secure to stay compliant in this age of constant data attacks.

read more
The Importance of Phone Etiquette at Work

The Importance of Phone Etiquette at Work

The use of phones is now so pervasive that we often use them casually and forget about phone etiquette. However, answering the phone at work is much different than using your phone. You become the point of the first contact for the caller, and you have a lot of responsibility in listening well and responding appropriately.

read more
Boost Cybersecurity with Managed IT Services!

Boost Cybersecurity with Managed IT Services!

There’s no “shortcut” to a strong data and network security policy, but there are some simple solutions that can make a big difference. Managed IT services is one of those ways—and here’s why.

read more
Backup Your Business

Backup Your Business

Security has come a long way and progressed quickly. Even if your strategy was recently updated, it is worth looking again.

read more

Download your FREE guide to discover what happens when businesses move away from a patchwork of providers and invest in a Unified Technology Approach. Less Chaos. More Confidence. Download the UTA ebook now!

Let’s Connect!

If you’re looking to learn more about the latest technology and cybersecurity, check out our resources:

How Vendor Consolidation Leads to Smarter IT Budgeting

How Vendor Consolidation Leads to Smarter IT Budgeting

Most organizations depend on more than one vendor for their technology. One might manage software licenses, another handles devices, and another provides tech support. What starts out as a straightforward setup often turns complicated once the bills,...

read more

Let’s Connect!

If you’re looking to learn more about the latest technology and cybersecurity, check out our resources: