Let's start with marketing... Marketing professionals know how to trigger the interest of the savvy business buyer. I'd dare to venture that the reference to ‘reasonable costs’ is something that led you to read this post. Call me a nerd but I believe there is something ... » Learn More about How to keep Internet costs reasonable
Cookies aren't always sweet. We have all heard of cookies - no not the kind you eat - the kind that an internet browser uses. They are important to websites because they hold a small amount of information that is relevant to a particular person that browses a site. Most ... » Learn More about Keep your nose out of my business!
At Makios, we believe you can’t talk about experience without providing examples. Our team of expert IT and security consultants understands the importance of letting success speak for itself. With a roster full of happy clients covering a wide range of markets and industries, ... » Learn More about Case Study: General Contractor
At Makios, we believe you can’t talk about experience without providing examples. Our team of expert IT and security consultants understands the importance of letting success speak for itself. With a roster full of happy clients covering a wide range of markets and industries, ... » Learn More about Case Study: Professional Civil Engineering and Land Surveying Company
At Makios, we believe you can’t talk about having experience without providing examples. Our team of expert IT and security consultants understands the importance of letting success speak for itself. With a roster full of happy clients covering a wide range of markets and ... » Learn More about Case Study: Transportation Company
At Makios, we believe you can’t talk about experience without providing examples. Our team of expert IT and security consultants understands the importance of letting success speak for itself. With a roster full of happy clients covering a wide range of markets and industries, ... » Learn More about Case Study: Insurance Brokerage Firm
At Makios, we believe you can’t talk about having experience without providing examples. Our team of expert IT and security consultants understands the importance of letting success speak for itself. With a roster full of happy clients covering a wide range of markets and ... » Learn More about Case Study: Healthcare Provider
If you are wondering if you are affected by the #VPNFilter hack check the latest list of devices that were affected, we went from 15 to more than 80 devices: Asus Devices: RT-AC66U (new), RT-N10 (new), RT-N10E (new), RT-N10U (new), RT-N56U (new), RT-N66U (new), D-Link Devices:, ... » Learn More about A reboot isn’t enough to kill VPNFilter
Many companies have adopted a BYOD (bring your own device) environment, either to save money on hardware or to maximize convenience among their employees. However, BYOD environments represent significant potential risks, because phones, tablets, and laptops often provide a direct ... » Learn More about Protecting Your Employees’ Mobile Devices
While computers and the internet have made many aspects of business and commerce easier, technology advances have not been entirely beneficial. Data breaches and catastrophic data loss are a painful reality for too many companies of all sizes. In many ways, passwords to email and ... » Learn More about Importance of Password Protection
Everyone has a certain level of risk tolerance. What’s yours? One way to determine the answer is to ask yourself what the cost would be if your business were disrupted or completely shut down even for a single day. Or an even more dire scenario: what if your company experienced ... » Learn More about Define Your Risk Tolerance
Before cybercriminals can wreak havoc on your computer system, they have to get past your security. By leveraging some basic safety strategies, you can protect your business from a cyber-attack. We’d like to share with you our Cyber Security Cheat Sheet. Consider this your ... » Learn More about Cyber Security Cheat Sheet
Sometimes it can feel like nobody’s safe from a cyber-attack. With large corporations like Target and Staples succumbing to breaches and ransomware, what can a small business owner do to make sure sensitive data and critical computer networks are protected? According to Symantec, ... » Learn More about Do You Have Layered Protection?
Cyber attacks begin with infiltration. Without access to your network, most hackers would fall well short of their goals, be it stealing sensitive data or holding files hostage. Unfortunately, even the strongest security protocols are no match for the careless or uneducated ... » Learn More about A Phishing Expedition
Pay or Play Crypto viruses work by locking all your files and documents with a password. The decryption key provided after paying the ransom frees the data and allows you to access your information. Once the hackers deploy the encryption virus, retrieval options are limited. You ... » Learn More about Crypto Viruses – Are You Safe?
When it comes to cybersecurity, we all understand the threat, but awareness is not enough. We need to safeguard against them. But hacking concerns and computer error problems can seem overwhelming and we often ignore them. It’s human nature to procrastinate, and we know it will ... » Learn More about Dealing with Technical Problems in a Practical Way
Hackers Never Sleep Earlier this year, an international ransomware attack incapacitated England’s National Healthcare System (NHS) while also disrupting operations at several private and public agencies in countries across the globe. Christened WannaCry, the ransomware attack ... » Learn More about Malicious Malware – Fact or Fiction?
From government agencies to international corporations and small businesses, these days it seems everyone’s data is under attack. In fact, according to the Identity Theft Resources Center, 2016 signified a high-water mark for data breaches, with 1,093 documented cases ... » Learn More about Are You an Easy Target?
We used to communicate using phone lines but that’s so 2016. Now everyone is talking about Voice over IP (VoIP). But is it worth the hype? Before we answer that question with a firm Yes, No, or Maybe, we should first look at what is VoIP, really. What is Voice over IP ... » Learn More about VoIP – All hype or Worth A Look?
Time is the greatest money-making asset any individual can possess. Ed Slott (Financial expert, author and public speaker) Some obsessions are good for you, especially if you are a business owner—you should have a few of them. In my case, I love making my business and those of my ... » Learn More about Why Being Lean Creates Better Profits
“Business today is all about doing things faster--making decisions faster, identifying trends faster, making mistakes faster, and getting products to market faster. However, you can't become a faster, more agile organization by just snapping your fingers and wishing it ... » Learn More about How agile is your technology?
Expect the best, plan for the worst, and prepare to be surprised. —Denis Waitley Like the ones before it, the year 2017 comes to us fresh—with a blank page just waiting to be written. What goals are at the top of your list right now? How will you take your company to new heights ... » Learn More about Makios Message of the Month: Be Strategic
What good is an idea if it remains an idea? Try. Experiment. Iterate. Fail. Try again. Change the world. — Simon Sinek If you’re like most business owners, your optimistic New Year’s resolutions focus on improving beyond the status quo. Makios cheers you on in that ambition and ... » Learn More about Change Your World in 2017
You may have antivirus and you may have a firewall— you may be foolproof. But are you phish-proof? If you live in El Paso, you probably heard the recent news that the city was scammed for $3.2 million by cybercriminals who tricked the city's staff into redirecting vendor payments ... » Learn More about The Cybercrime that cost El Paso millions; How Makios can phish-proof your staff
It’s that time again—your regular Password Health Check-up is due. Now, before your eyes start to ‘roll and scroll’, skipping on to something you haven’t heard before, listen to this-- Last week’s massive cyberattack, which outsmarted some of the best and brightest and shut down ... » Learn More about One Culprit Behind Last Week’s Massive Cyberattack? Weak Passwords
Don't be alarmed if you have received the above message or do so in the near future. In October 2015, after Intel Security acquired McAfee, they announced the end of life for the majority of McAfee email security solutions effective January 2017. Since the beginning of 2016, ... » Learn More about Important Notice: McAfee End of Service Warning
Zombies, witches, werewolves, and grotesque monsters of every shape and size emerge from the shadows, hunting you down with ever-increasing speed and precision, their beady red eyes glowing. You try outrunning them—ducking, hiding, counter-attacks of all sorts, but no matter what ... » Learn More about Don’t Let The Monsters In
Makios is the leading partner when it comes to IP or "VoIP" telephony. We have been a huge fan of IP Office for many years and implemented systems for many clients successfully over the years. It is just one of those solutions that you set and forget, yet it continues to ... » Learn More about Avaya Steps Up Their Game with IP Office Release 10
If you invested in IP Office and want to get the most out of it, we suggest you get acquainted with an awesome company called Xima which was started by former Avaya employees who know the hardware inside and out. Xima's software gives you incredibly accurate, thorough, ... » Learn More about A 360 Degree Overview of Every Call Your Business Receives
When it comes to earning trust and recognition in your field—whatever that field may be—one of the most difficult and yet most valuable traits you can have is staying power. As Makios looks ahead to our upcoming 10 year anniversary with a sense of gratitude and accomplishment, we ... » Learn More about Makios Congratulates Gorman on 70 years
Hackers no longer worry about getting caught because it's easy to remove any evidence that they were even there in the first place. They make a living at catching people and systems off guard through social engineering and other methods. Today's hackers are patient. They don't ... » Learn More about How Secure is “Secure”?
When we started our firm back in 2006 we didn’t know what to expect—where the journey would take us, who we would meet, or what the future would look like. All we knew is that we were motivated to help businesses improve their business and being part of that is something very ... » Learn More about Happy Team = Successful Business
You’re sipping a latte at your favorite café, taking advantage of the free Wi-Fi to catch up on the news of the day and remember your favorite shopping site is having a 50% off sale that only lasts for the next two hours. It takes no time at all to load up your shopping cart and ... » Learn More about Enjoy free Wi-Fi without the security risks
You can try to beat the odds and read every message in detail but with so many distractions nowadays its very hard (mind you we tried and failed…). So instead of being brave, be safe. Having Makios Cloud Security in place will give you the message as displayed in the image above ... » Learn More about How to Live Worry-Free in a Dirty Digital World
We said it before, and we will say it again; Cyber Security is not an IT problem, it’s an EVERYONE problem. But problems are made to be solved, right? There are ways to keep your systems protected. One thing you should definitely do is always keep your systems up-to-date as well ... » Learn More about Cyber Crime Fighters Unite – Against “Leaving Your Keys in the Car”