ERC Processing Moratorium Announced

Over the past year, the IRS has been warning taxpayers about the increasing number of aggressive promoters and marketing companies pushing the Employee Retention Credit (ERC). These bad actors, so called ERC Mills, have relied on direct mail, radio, and television advertisements promising business owners’ access to thousands in federal...


Understanding Utah’s Cybersecurity Affirmative Defense Act

Cybersecurity is a major concern for individuals, businesses, and government agencies alike. Cybercriminal attacks continue to grow at an alarming rate, making it important for states to write and pass legislation that empowers organizations to defend against these threats and protect organizations from legal consequences. Utah’s Cybersecurity Affirmative Defense Act...


Unmasking the Threat

The Latest Cybersecurity Concerns Surrounding New Fortnite Scams In the ever-evolving landscape of cybersecurity, threats can emerge from unexpected sources. The digital age has brought about new opportunities for malicious actors to exploit unsuspecting youth victims, and the gaming industry is no exception. Recently I noticed a concerning trend has...


microsoft netlogon

We are constantly trying to identify and address vulnerabilities that pose risks to our clients’ systems. One area that has been a concern is the long-standing weaknesses in Microsoft’s network authentication protocols, which have provided an avenue for Pass the Hash (PtH) attacks. While we don’t have access to technical...


Cybersecurity in the Workplace

How to Keep Your Company and Employees Safe I wrote an article a few weeks ago outlining simple tasks that could be implanted to protect personal information. Today, I want to follow that article up with one targeted toward businesses. As a professional IT security consulting firm, we perform IT...


Enhancing Network Security

A Comprehensive Approach to Safeguarding Your Business Cyber threats are evolving rapidly, and businesses must take proactive measures to protect their sensitive data, intellectual property, and customer information. As a leading network security consulting firm, we are committed to helping our clients navigate the complex landscape of cyber risks and...