Jackson Thornton Technologies News + Updates

Jackson Thornton Technologies has been serving the Southeast since 1999, providing IT consulting and managed services, technical helpdesk support, cybersecurity assessments, and business continuity and disaster recovery to small and medium-sized businesses.

Four Technologies You Can Use to Better Protect Your Data in Transit

Four Technologies You Can Use to Better Protect Your Data in Transit

A lot of business is done over the Internet, so securing transactions is crucial to protect sensitive information and prevent unauthorized access or even fraud. There are multiple things you can do to improve your data while it is in transit; and, today, we take a look at four. 

0 Comments
Continue reading

The Problems that Cybercrime Can Pose for Business

The Problems that Cybercrime Can Pose for Business

Unfortunately for small businesses, cyberthreats aren't limited to large corporations and enterprises. Even small businesses and local shops face the constant risk of cyberattacks. Let's take a look into some concerning statistics regarding one of the fastest-growing cyberthreats.

0 Comments
Continue reading

Three Benefits of Digital Security Cameras

Three Benefits of Digital Security Cameras

Digital security cameras offer numerous advantages over their analog counterparts, making them a popular choice for enhancing security in various settings. Here are three key benefits of using digital security cameras.

0 Comments
Continue reading

The Advantages and Disadvantages of a Password Manager

The Advantages and Disadvantages of a Password Manager

Passwords play a pivotal role in safeguarding an organization's cybersecurity, serving as a vital tool for employees that surpasses the risks of relying on their own memory. In this month's discussion, we delve into the advantages and disadvantages of employing password managers to fortify the protection of company-owned digital assets.

0 Comments
Continue reading

National Student Clearinghouse Data Breach Exposes Personal Information of Over 50,000 Individuals

National Student Clearinghouse Data Breach Exposes Personal Information of Over 50,000 Individuals

One major nonprofit has become the victim of a disclosed major data breach, affecting 890 schools all across the US: the National Student Clearinghouse, or NSC. The organization has announced that they have experienced a considerable data breach that has put their clients’ data at risk. What does this mean for affected organizations and their clientele?

0 Comments
Continue reading

Critical Security Measures for Data Privacy

Critical Security Measures for Data Privacy

These days, data privacy is absolutely critical in both a business and individual context. In some locations, governments have introduced legislation to protect consumers, and in others, there is significant pushback in favor of fewer regulations on business. How does data privacy factor into your business’ operations?

0 Comments
Continue reading

Ransomware is One Problem that Leads to Many More

Ransomware is One Problem that Leads to Many More

There are a lot of threats to businesses nowadays, but ransomware seems to be the worst… or at least, the most feared. It seems as though we can’t mention cyberthreats anymore without mentioning ransomware. Unfortunately, we’re right to do so, and the reason for this is a simple one.

0 Comments
Continue reading

Tip of the Week: Worried About Phishing? Use the SLAM Method

Tip of the Week: Worried About Phishing? Use the SLAM Method

Phishing is a very real, very dangerous threat to modern businesses, which makes it extremely important that you and your whole team are prepared to spot and mitigate it. One simple framework to do so is known as the SLAM method, so let’s take a few moments to review some tips for using it.

0 Comments
Continue reading

Encryption is a Tool All Businesses Should Use

Encryption is a Tool All Businesses Should Use

You might see encryption as a major benefit to your cybersecurity strategy, but it’s often used in a way that might have you guessing whether you really understand it. Let’s take a closer look into what encryption does to your data, as well as why it is essential for any business to ensure maximum privacy and security.

0 Comments
Continue reading

The Help Desk is a Big Help for Your Workforce

The Help Desk is a Big Help for Your Workforce

With technological advancements, challenges arise, and technical issues inevitably occur. This is where an IT help desk comes into play. Let’s explore how an IT help desk operates and why it is a valuable asset for any business.

0 Comments
Continue reading

Cybersecurity Needs to Be a Priority for Everyone… Especially Your Business

Cybersecurity Needs to Be a Priority for Everyone… Especially Your Business

How often does your company take it upon itself to ensure that those working for its success—your employees—are kept up to speed on cybersecurity? If your approach is to have your team sit in a room and watch a presentation once a year, it’s time to reconsider your training strategy. Let’s talk about the impact that proper cybersecurity training can have, and who tends to have access to it.

0 Comments
Continue reading

FTC Safeguards Gets a Crucial Update

FTC Safeguards Gets a Crucial Update

The United States Federal Trade Commission’s mandate is to prevent fraud and promote consumer protection in today's interconnected world, where the digital landscape continues to evolve at a rapid pace. The FTC recognizes the importance of safeguarding consumer information and has implemented their Safeguards Rule as a means to ensure that businesses protect sensitive data from unauthorized access and misuse. Let’s take a look at the Safeguards Rule and what you need to know about it in regard to your business. 

0 Comments
Continue reading

Smishing: A Variety of Phishing Attacks Utilizing SMS

Smishing: A Variety of Phishing Attacks Utilizing SMS

We discuss phishing often on this blog, and one method that often flies under the radar is smishing, or phishing that is conducted through SMS messages. Although email phishing is perhaps the most common method of conducting these scams, you should also be prepared to take on smishing, as it comes with its own share of unique challenges and dangers.

0 Comments
Continue reading

Do You Know How Much You Should Be Spending on Cybersecurity?

Do You Know How Much You Should Be Spending on Cybersecurity?

Nowadays, you can’t afford not to have some portion of your business’ budget set aside for cybersecurity. The question is, how much do you need, and what should you be spending it on first? Let’s take a few moments to dig a little deeper into this question and examine a few cybersecurity protections you should establish as your business’ baseline defenses.

0 Comments
Continue reading

Securing Your Wireless Network

Securing Your Wireless Network

Your business has to promote security whenever it can. In terms of keeping your wireless connections secure, the thought behind it is that if unauthorized people and machines can access your network without protections, they can do what they please with the data on the network. This is a big problem. Let’s go through a few things you need to consider to keep your wireless network secure. 

0 Comments
Continue reading

Don’t Fall for These 3 Browser Myths

Don’t Fall for These 3 Browser Myths

There is a lot of misinformation and misperceptions out there related to network security, especially where small businesses are concerned. In particular, browser security is one aspect where many individuals’ knowledge simply falls flat, and they buy into myths that put their data at risk. Let’s clear up some of these misconceptions so you can go about your day in a more secure way.

0 Comments
Continue reading

Which Security Issues Should You Watch Out for In Your Business?

Which Security Issues Should You Watch Out for In Your Business?

While it is important that your business implement comprehensive network protections, there are plenty of simple ways that your business’ cybersecurity could potentially fail. This could easily cost you heavily in your available capital, financial and social alike.

0 Comments
Continue reading

Incorporating Insights From Enterprise Companies Can Benefit Your Business’ Security

Incorporating Insights From Enterprise Companies Can Benefit Your Business’ Security

Businesses cannot afford to grow complacent with their network security, as it could make a significant difference between falling prey to an attack and remaining secure. The process of securing a network must be looked at holistically, from top to bottom. This idea of enterprise security is not new, but even a small business needs to keep it in mind, and these solutions are more accessible than you might think.

0 Comments
Continue reading

What Does Effective Security Training Involve Nowadays?

What Does Effective Security Training Involve Nowadays?

One major aspect of your business’ security is how well your team is trained to preserve it. Let’s go over some of the aspects that you need to be sure you address as you educate your team.

0 Comments
Continue reading

Just Because Google Chrome Offers Password Management Doesn’t Mean You Should Use It

Just Because Google Chrome Offers Password Management Doesn’t Mean You Should Use It

One of the reasons that information technology keeps changing is for the sake of the user and their convenience using it. However, if this convenience comes at the sacrifice of your business’ cybersecurity, it just isn’t worth it. This is the crux of why we always recommend that any organization seeking to use password management should invest in a reputable password management software, rather than the built-in capabilities of modern browsers.

0 Comments
Continue reading
Request a Consultation

Jackson Thornton Technologies strives to provide the best comprehensive IT, Computer, and Networking services to small businesses. We can handle all of your organization's technology challenges.

Contact Us
Contact Us

Learn more about what Jackson Thornton Technologies can do for your business.

200 Commerce Street ,
Montgomery, Alabama 36104

Call us: (877) 226-9091

News & Updates

Jackson Thornton Technologies is proud to announce the launch of our new website at www.jttconnect.com. The goal of the new website is to provide more information about our services for prospective clients.