A Look Into CIS Controls

A Look Into CIS Controls

Logical Net is often asked “What are best practices in cybersecurity, as it can affect every aspect of my business and can be very complex”” and “Where do I start and how do I know I’m doing a good job?” Engaging with a cybersecurity provider like Logical Net is a...
The Hidden Costs of a Cyber Attack

The Hidden Costs of a Cyber Attack

We continue our focus on cybersecurity in our February newsletter as cyber criminals constantly invent new attacks. We invite you to schedule a cyber health check with us.   Summary Cyber attacks represent a significant threat to businesses of all sizes, but the...
Sliding Towards Success: Our Team Building Day Out on the Ice 

Sliding Towards Success: Our Team Building Day Out on the Ice 

At LogicalNet, we understand that a cohesive team is the bedrock of any successful business. That’s why we recently took a break from our usual routine and headed to the Schenectady Curling Club for a day of curling – a sport that epitomizes strategy, precision,...
Penetration Testing: What It Is & Why It’s Needed

Penetration Testing: What It Is & Why It’s Needed

An annual penetration test, also known as a pen test, is a crucial component of a comprehensive cybersecurity strategy for small and medium-sized businesses (SMBs). This proactive approach is designed to identify and address vulnerabilities in your environment before...
IT Checklist to Improve Your Security, Costs & Revenue

IT Checklist to Improve Your Security, Costs & Revenue

As you close out 2023 and launch into the new year, here’s an IT checklist that can help you bolster security, optimize costs, enhance revenue, and streamline organizational processes: Security Audit and Updates: Conduct a comprehensive security audit to...
Protect Yourself From These MS365 Vulnerabilities

Protect Yourself From These MS365 Vulnerabilities

This month’s newsletter continues our cybersecurity journey with an overview of Microsoft 365 vulnerabilities and recommended security solutions for MS365. MS365 is now the #1 attack vector for cyber criminals because business email compromise is an easy way to prey...