Nonprofit organizations often operate within tight budgets and face unique challenges when it comes to managing their IT services. Two common pricing models offered by IT providers for their services are Time and Materials (T&M) and Managed Service Provider (MSP)....
TEK/tok blog
News, tips & tutorials from the world of IT
The Latest
Simulated Phishing: A Critical Part of Cybersecurity Training
Simulated phishing tests are critical to a well-rounded cybersecurity awareness program. By sending fake phishing emails to employees, you can condition your staff to identify and respond appropriately to attacks, all within a safe environment. The goal of simulated...
Navigating the AI Landscape: A Personal Review
The AI landscape is a vast new playground, and experimenting with ChatGPT and other Generative Pre-trained Transformers is fun! (Although I must say I am not impressed with the haikus ChatGPT generates, one of its initial “claims to fame”. For that, I prefer to use it...
QR Code Phishing: From Scan to Scam
You may have heard of QR code phishing – cutely nicknamed “quishing” to fit right in with its other phishing counterparts, like smishing (SMS phishing) and vishing (voicemail phishing). This is the latest method used by hackers to steal your credentials by weaponizing...