Applied Technology Group Inc.
Specializing in Managed IT Solutions
Applied Technology Group Inc. is a company that offers complete solutions and support for your Managed IT needs. We specialize in network management, phone systems, and security/surveillance solutions.
Applied Technology Group’s Tech Byte’s Blog

Fixing Your Weakest Link: Your Employees
Phishing: Part 3You can have every piece of security hardware in the books: firewall, backup disaster recovery device, and even anti-virus. However, your employees will still be the biggest vulnerability in your organization when it comes to phishing attacks. How do you mitigate as much risk as possible?Create and Strictly Enforce a Password Policy: Passwords should […]

How to Spot A Phishing Attack
Phishing: Part 2Would you know if you were the subject of a phishing attack? Many people claim that they’d be able to tell right away if they received an email from an illegitimate source. If that were the case, there wouldn’t be 1.5 million new phishing websites every month. A 65% increase in attacks in one year! Hackers […]

What Is Phishing & How Are Hackers Using It?
Phishing: Part 1While the number of people falling for sending personal information to the crown prince of Nigeria in hopes of receiving his promised wealth and riches seems to be dropping, phishing remains a major issue. In fact, the number of phishing campaigns pursued by hackers around the world increased 65% in the last year.What exactly […]

Can Your Business Handle a Ransomware Attack?
Cybersecurity Strategy: Part 4Most people have adapted well to the digital world and ransomware attacks. Our daily lives now include much time spent online. With the help of our laptops and mobile devices, we talk with friends, attend meetings, go shopping, and so much more. And while we use these modern conveniences, many of us […]

Fixing Your Weakest Link: Your Employees
Phishing: Part 3You can have every piece of security hardware in the books: firewall, backup disaster recovery device, and even anti-virus. However, your employees will still be the biggest vulnerability in your organization when it comes to phishing attacks. How do you mitigate as much risk as possible?Create and Strictly Enforce a Password Policy: Passwords should […]

How to Spot A Phishing Attack
Phishing: Part 2Would you know if you were the subject of a phishing attack? Many people claim that they’d be able to tell right away if they received an email from an illegitimate source. If that were the case, there wouldn’t be 1.5 million new phishing websites every month. A 65% increase in attacks in one year! Hackers […]

What Is Phishing & How Are Hackers Using It?
Phishing: Part 1While the number of people falling for sending personal information to the crown prince of Nigeria in hopes of receiving his promised wealth and riches seems to be dropping, phishing remains a major issue. In fact, the number of phishing campaigns pursued by hackers around the world increased 65% in the last year.What exactly […]

Can Your Business Handle a Ransomware Attack?
Cybersecurity Strategy: Part 4Most people have adapted well to the digital world and ransomware attacks. Our daily lives now include much time spent online. With the help of our laptops and mobile devices, we talk with friends, attend meetings, go shopping, and so much more. And while we use these modern conveniences, many of us […]