Pipeline Update

Contigo Technology Pipeline Update The FBI investigation report has been released detailing the events of the hack that took place. Here’s what we learned. Around April 29th the hacker group known as DarkSide gained control of the Colonial Pipeline through an old VPN account that did not have Multi-Factor Authentication. The VPN account’s credentials and passwords were previously leaked on the Dark web leading to...Read More

Austin Cyberattacks

Contigo Technology Austin Cyberattack? The rise in cyberattack has finally surfaced into the public’s eye. The Colonial Pipeline and JBS S.A. are just a few of the big targets that have made national headlines. What is not seen, however, is the ransomware attacks on Small-Medium Businesses (SMBs). A booming city with lots of SMBs is a perfect spot for cyberattacks to occur. The most common...Read More

Top 9 device(IoT)-Related Security Threats Businesses Face

The Internet of Things (IoT) is rapidly changing the technology landscape as we know it. Businesses worldwide are leveraging IoT for benefits such as seamless collaboration, access to comprehensive data and the ability to make stronger business decisions based on insights derived from substantial data. Experts estimate the total number of installed IoT-connected devices worldwide to amount to 30.9 billion units by 2025.1   However,...Read More

3 Ways the Pandemic has Impacted IT End User Support for SMBs

By Eli Newman - Over the past year, small and medium businesses (SMBs) have experienced what most would call one of the most shocking – and ultimately, one of the most rewarding – shifts in IT service delivery. Coronavirus forced many organizations to convert to a work-from-home model almost overnight, revealing some deep-seated flaws in the traditional delivery of end user support. As enterprises everywhere...Read More

Contigo Technology Now a Licensed RPO | CMMC

Contigo Update - Registered Provider Organization Contigo is proud to announce that we are one of the first Austin Businesses to be RPO licensed for CMMC. An RPO – Registered Provider Organization – offers advice, and consulting for CMMC level assessment preparation. Contigo has undergone a thorough background check to meet the requirements of the accreditation body. In alignment with our mission, Contigo Technology continues...Read More

Contigo Employee Spotlight: Chris Quick

 By Nathan Montgomery - This month's employee spotlight shines on Senior System Admin Chris Quick. Chris is a vital part of Contigo Technology. Efficiently handling escalated cases from the tier I and tier II help desk, Chris balances many projects on his plate while managing Contigo's internal network, data center, and client data centers. Click the video to learn more about how Chris Quick...Read More

A Closer Look into Your IT Outsourcing Report: Asset Management Edition

By Eli Newman - If your IT assets account for most of your company’s total assets, you’re not alone. In fact, this is the case for the majority of modern-day businesses. Because IT assets tend to be expensive to purchase and maintain, asset management plays an important role in ensuring that IT teams are using your enterprise’s resources as efficiently as possible. This helps organizations...Read More

Warranties: Protecting Your IT Investment

By Nathan Montgomery - Letting the warranty do the work. Contigo Technology’s mission is to provide comprehensive and easy-to-understand IT Support for your business. Through our warranty service, we can provide quick and cost-effective care for all your equipment. From Network equipment to workstations, we can add warranties to it all, keeping your business operating as usual and minimizing downtime by getting next-day repairs by...Read More

Understanding CMMC Compliance: A Deep Dive into the Five Maturity Levels

By Eli Newman - The Cybersecurity Maturity Model Certification (CMMC) is a fairly new IT security framework that was developed to standardize the security controls utilized by government contractors to safeguard controlled unclassified information (CUI). Achieving complete CMMC compliance involves the implementation of 171 security controls, which is far above and beyond what most organizations can effectively implement at one time. Because of this, the...Read More

Your Biggest Cybersecurity Risk: Your Employees

By Kaseya Cybercriminals work round the clock to detect and exploit vulnerabilities in your business’ network for nefarious gains. The only way to counter these hackers is by deploying a robust cybersecurity posture that’s built using comprehensive security solutions. However, while you’re caught up doing this, there is a possibility you may overlook mitigating the weakest link in your fight against cybercriminals — your employees....Read More

Getting Ready for New CMMC Requirements Now

  By Kaseya - Right off the bat, we’re here to tell you that anyone promising you a sure-shot solution to all your CMMC woes is trying to pull a fast one on you. The Cybersecurity Maturity Model Certification (CMMC) is a comprehensive move by the U.S. Department of Defense (DoD) that involves a lot of moving parts that have not been finalized yet. In...Read More

Understanding Your IT Security Assessment Report & What Comes Next

By Eli Newman - Gone are the days when securing your company’s private data and business-critical systems was a one-and-done activity. Today, hackers and other malicious actors are constantly coming up with new ways to phish your employees, access your systems, and disrupt your operations for financial gain, meaning that you must always be on the lookout for potential weak points in your network. In...Read More

Returning to the Office?

        By Bryan Fuller - With our clients switching back to in-office work, Contigo would like to be proactive in making sure the transition is smooth. If your company plans on bringing large volumes of staff back on-site, please let us know beforehand. We will send a technician on-site to support your team as they get back up and running. Common IT...Read More

Director of Finance – The Importance of Encrypting Your Emails

By Marc Lucio - Encrypt your emails that contain sensitive information. As the Director of Finance for Contigo Technology, I regularly deal with bank accounts, payment information, social security numbers, and other sensitive data. All businesses have similar types of data regardless of the vertical and can be at risk. As part of our service, we offer the ability to Encrypt messages via email directly...Read More

No More Risky Business: 4 Reasons Firms Should Leverage Cyber Security Assessment Services

By Eli Newman - Risky business is the last thing modern-day enterprises want to deal with (and no, we’re not referencing the 1983 film starring Tom Cruise). That’s right, folks – today we’re talking about cyber security risks. Most organizations are fully aware of the fact that cyber threats are multiplying by the minute, and many of them already use some form of defense to...Read More