Security Alert

New cybersecurity threats are emerging daily. Small Enterprise Technologies is constantly monitoring hacking attempts and exploits across the industry to ensure our clients are as protected as possible. Through our processes, we are able to pinpoint critical new vulnerabilities on the same day that they become known and provide remediation steps for clients.

What is Included in a Disaster Recovery Plan?

June 10, 2022 When most people think of a disaster, their minds go to natural disasters or terror attacks. Earthquakes, tornados, tsunamis, or hurricanes are all very harmful to areas, and the buildings or houses found in them. These natural disasters could damage or destroy a business’s worksite. However, in the world of business, other…

5 Data Security Solutions to Protect Sensitive Information

May 13, 2022 In a digital society, like the one we live in, data breaches are happening at an alarming rate. Any company that accepts, transmits, or stores sensitive information of their client, like card information, must meet specific security standards to be compliant. New compliance regulations are demanding more stringent data protection measures and…

How Much Do Managed IT Services Cost?

April 8, 2022 If you own or operate a tech-dependent company – and let’s face it, most companies are tech-dependent – then you know that if even one of your precious pieces of technology stops working, your operations stop with it. Having a solid plan for such an issue could save your company time and…

What is the Difference Between Cybersecurity and Information Technology?

March 11, 2022 In a day and age that relies so heavily on computers and hardware to keep the digital world rolling, it is vital to have a strong backbone within your computer systems and protect against virtual threats. This article will guide you through the ins and outs of Information Technology and Cybersecurity and…

How Often Should a Business Back-Up Its Data?

February 15, 2022 In a world entombed in digital technology, data is the driving force for all businesses, large or small, and most individuals. Whether this data represents sales, customer information, quantity on hand, contacts, bank account information, user passwords, etc., must be protected at all costs. There are many ways to protect your data,…

What is Log4j, and How is it Exploited?

January 21, 2022 The virtual world was shaken in early to mid-December of 2021 as many users of Apache Software Foundation’s Log4j logging utility noticed a crucial flaw within the system. Among others, Microsoft’s Minecraft was the first to see this flaw as they posted a warning to their java-based users of the threat of…

Tulsa Businesses Impacted by Ransomware Attack

December 20, 2021 As many residents of Tulsa search for the perfect last-minute gift, they may encounter a new problem – being able to pay for it. Over the final weekend before Christmas, a popular payroll and HR service that manages several local accounts was hit by a ransomware attack. With impacts expected to last…