Cybersecurity

I man pointing a finger on an illustration of business IT infrastructure

Does Your Business Need IT Infrastructure Upgrades?

By Shane Morris / July 30, 2024 /

Introduction Staying ahead of the competition requires more than just having a basic IT infrastructure in place. The key to success is adaptability, scalability, and high performance. As businesses continue to rely on technology for their day-to-day operations, it’s essential to evaluate whether your current IT infrastructure is up to the task. SUURV Technologies, your…

Read More
Picture of a woman illustrating the need to separate a Personal Phone from Business Phone Usage.

Why Your Personal Phone Should Stay Personal: Risks of Mixing Business and Mobile

By Shane Morris / July 16, 2024 /

Our smartphones are an extension of ourselves. They hold our personal lives, from cherished photos to private messages. But when it comes to work, blurring the lines between personal and professional on your phone can lead to a host of problems. While the convenience of using your personal device for business calls and texts might…

Read More
FileVault

How to Protect Your Macs from FileVault Recovery Key Issues

By Shane Morris / June 20, 2024 /

If you are a Mac user, you may have heard about the recent updates to MacOS Sonoma 14.4 and 14.1 that have been resetting user’s FileVault recovery keys. FileVault is a built-in encryption feature that protects your data from someone who might obtain physical access to your device.  During this update, users are presented with…

Read More
password manager

Cracking the Code: Why Your Team Needs to Embrace Password Managers

By Shane Morris / May 4, 2024 /

Introduction: From social media accounts to financial portals, we juggle a staggering number of online identities, each requiring a unique and secure password. But let’s face it, remembering complex passwords for every platform is a recipe for disaster. This is where password managers come in – the unsung heroes of cybersecurity. At SUURV Technologies, we…

Read More
compliance audits

Compliance Audits: Lessons from the SEC Lawsuit of SolarWinds

By Shane Morris / November 20, 2023 /

A Brief History On October 30, 2023, The Securities and Exchange Commission (SEC) filed a lawsuit against SolarWinds, the information technology firm that fell victim to a Russian-backed hacking group in a major cyber-espionage incident in 2019. The SEC alleges that SolarWinds committed fraud and failed to maintain adequate internal controls for several years leading…

Read More
Foster Safe Online Practices in Children

Ten Tips for Parents to Foster Safe Online Practices in Children

By Shane Morris / July 27, 2023 /

Every generation of parents faces unique challenges in parenting as society advances and evolves. The upbringing in the 70s differed significantly from the 90s, and both seem vastly different from the present era. Listening to my father’s tales of his childhood feels like stepping into a different world altogether. In today’s digital age, with the…

Read More
business continuity plan graphic

How to Create a Business Continuity Plan

By Shane Morris / January 16, 2023 /

In the wake of the recent ransomware breach at Rackspace, many of their customers lost all access to their email accounts, calendars, and other critical information. The company responded by initiating emergency protocols. User accounts were migrated from Rackspace’s hosted Exchange to Microsoft’s O365 platform. Despite restoring services, users lost all their data due to…

Read More

Information Access: Avoiding Lax Controls in Your Business Environment

By Steve Jordan / November 30, 2022 /

The Need for Management Information Systems Our Information Age appears to be entering a midlife crisis with many of us suffering from TMI… Yes, “too much information.” No, we’re not addressing that awkward issue of #peopletalktoomuch. As a technology company, we try to stay in our lane. Our focus is dealing with the vast amounts…

Read More

How Scammers Steal Information. What You Need to Know about Social Engineering.

By Shane Morris / September 20, 2022 /

Article Summary: The phrase “social engineering” is used to describe a wide variety of scamming tactics that hackers use when interacting with their potential victims. Often times, unsuspecting people are duped into divulging critical information or committing security blunders. Scammer attacks generally fall into one of these five categories: baiting, scareware, pretexting, phishing, and spear…

Read More
Cisco Umbrella

Cisco Umbrella Pulls Out of Russia and Belarus

By Shane Morris / August 3, 2022 /

On August 1st, 2022, Cisco Umbrella began blocking all traffic originating out of Russia and Belarus (source). This move was first announced by the company on March 3rd to show support for their customers and employees in Ukraine and to condemn Russia’s aggression against their country. What implications does this have for your business? Here…

Read More