top of page

NEWS


Four Ways Disasters Fuel Cyberattacks
Your business, in all likelihood, already faces numerous challenges in today’s tech-driven world. However, the aftermath of an unexpected...


Don’t Sabotage Employee Cybersecurity Training with These Common Mistakes
In today’s rapidly evolving threat landscape, employee cybersecurity training is crucial. It acts as the frontline defense against...


Monitor Remote Employees’ Web and Desktop Application Usage
Is there still room to improve your remote team’s productivity? Databranch has helped many businesses add remote work capabilities to...


Create an Army of Employees to Fight Cybercrime
It’s common belief that people are the last line of defense during a cybersecurity attack. Wrong. In many instances people are in fact...


Windows 8.1 Just Lost All Support. Here’s What You Need to Know
Companies both large and small share this one cybersecurity problem. They have computers that are still running older operating systems....


Happy World Backup Day!
March 31st is World Backup Day , a n annual date celebrated by the tech industry to highlight the importance of protecting your data and...


Tips for Overcoming Barriers to a Smooth BYOD Program
Bring your own device (BYOD) is a concept that took hold after the invention of the smartphone. When phones got smarter, software...


The Biggest Vulnerabilities that Hackers are Feasting on Right Now
Software vulnerabilities are an unfortunate part of working with technology. A developer puts out a software release with millions of...


Patch Your Computers and Reduce Your Risk
Benjamin Franklin once said, “An ounce of prevention is worth a pound of cure.” This age old advice is easily applied to the digital...


6 Important IT Policies Any Size Company Should Implement
Many small businesses make the mistake of skipping policies. They feel that things don’t need to be so formal. They’ll just tell staff...


Top 5 Mobile Device Attacks You Need to Watch Out For
Smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They’re more...


The Benefits of Penetration Testing
Risks associated with cybersecurity threats and exposures motivate organizations to implement protective controls intended to keep their...


Top 5 Cybersecurity Mistakes That Leave Your Data at Risk
The global damage of cybercrime has risen to an average of $11 million USD per minute, which is a cost of $190,000 each second. 60% of...


Making Your VoIP Network Bulletproof – Six Tips to Protect Your VoIP from Cyberattacks
Hardly any phone call system in a business beats VoIP when it comes to efficiency and flexibility. However, it’s not immune to...


Is Updating From Windows 10 to 11 Worth It? Here Are the New Features in the OS (And Some Missing Ones)
Getting used to Windows 11 shouldn’t be too challenging. On the contrary, the OS comes with several intuitive features to enhance...


Introducing Nicole Juda: New Databranch Sales & Marketing Coordinator
Education: Bachelor’s degree in environmental sciences and Ecology from SUNY Brockport. How did you get into the technology field? This...


Creating an IT Compliance Policy – The 7 Things You Need to Consider
IMAGE SOURCE: https://unsplash.com/photos/mfB1B1s4sMc Conducting business operations in the digital world is prone to security risks....


Do you know Rock-IT VoIP?
Have you heard about Databranch’s Hosted VoIP Platform, Rock-IT VoIP ? VoIP stands for Voice Over Internet Protocol, or having your...


Don’t Blame the New Guy….
Have you taken on any new staff recently? Did your onboarding include cybersecurity training ? If not it should, because both new...


Creating Cybersecurity Superheroes
How do you create cybersecurity superheroes? By offering Security Awareness Training! Databranch offers our client’s a Security...
bottom of page


