Get a Quote

Resources

Browse our library of helpful resources designed to keep your employees productive, your systems up and running, and your business secure from the latest cybersecurity threats.

Browse our library of helpful resources designed to keep your employees productive, your systems up and running, and your business secure from the latest cybersecurity threats: QuickTipsLinda’s Tech Tips | In The News | Success Stories

QuickTips

4 Ways to Protect Yourself from New Google Calendar Exploit

4 Ways to Protect Yourself from New Google Calendar Exploit

Last week, a new twist on traditional cyberattacks made the news. Gmail users were hit with fake Google Calendar notifications that, when accepted, led...

Continue Reading >
Baltimore’s Cybersecurity Crisis: What Happened and What’s Next

Baltimore’s Cybersecurity Crisis: What Happened and What’s Next

Last month, cybercriminals hacked into critical parts of Baltimore’s computer systems. City officials announced on May 7 that a ransomware attack encrypted important data,...

Continue Reading >
New Password Security Issues Could Affect You

New Password Security Issues Could Affect You

Last week, Google revealed that millions of user passwords had been stored in an unencrypted, unprotected plain-text format—for the past 14 years. The bug...

Continue Reading >
Summer Travel Tips You Can Take With You

Summer Travel Tips You Can Take With You

This weekend marks the unofficial start of summer, with Memorial Day kicking off another season of vacation and relaxation. Of course, that doesn’t mean...

Continue Reading >

Linda's Tech Tips

Google Calendar Attacks Are Targeting Unwitting iPhone and Android Users

Google Calendar Attacks Are Targeting Unwitting iPhone and Android Users

  Google Calendar Attacks Target Unwitting iPhone and Android Users https://threatpost.com/google-calendar-attacks-mobile/145588/ Users of Gmail on iPhone and Android devices are being targeted by fraudulent,…

Continue Reading >
Cisco Products Security Flaw, aka: “ThrangryCat”

Cisco Products Security Flaw, aka: “ThrangryCat”

Security Experts have discovered that Cisco networking products manufactured since 2013 have an internal flaw dubbed “ThrangryCat”, which could allow a persistent “backdoor” to be installed on affected devices .

Continue Reading >
Should You Use Airport USB Charging Stations?

Should You Use Airport USB Charging Stations?

The summer travel season is in full swing, which means many of us will spend time over the next few months in airports. Whether…

Continue Reading >
Outlook Web is Rolling Out – Are You Onboard?

Outlook Web is Rolling Out – Are You Onboard?

The new version of Outlook Web is being rolled out.  What is in it for you? The great thing about Microsoft 365 is that…

Continue Reading >

Success Stories

VIDEO: Media Company Benefits from Proactive IT Support

VIDEO: Media Company Benefits from Proactive IT Support

 Josh Sommers, CEO of Focus Media, explains how establishing a partnership with CMIT Solutions helped his company grow.

Continue Reading >
The New Outlook Web is Coming

The New Outlook Web is Coming

The new version of Outlook Web is being rolled out. What is in it for you? The great thing about Microsoft 365 is that…

Continue Reading >
VIDEO: Recycling Company Grows Rapidly Thanks to Responsive Support and Custom IT Solutions

VIDEO: Recycling Company Grows Rapidly Thanks to Responsive Support and Custom IT Solutions

 Didion Orf, a Missouri recycling company, needed to streamline communication processes and expand their network. CMIT worked along side the company to create…

Continue Reading >
VIDEO: Design and Build Company Grows Thanks to Multi-Location Support and Responsive IT Services

VIDEO: Design and Build Company Grows Thanks to Multi-Location Support and Responsive IT Services

 Katherine Ng of Wu & Associates, breaks down their relationship with CMIT Solutions. Wu & Associates provides general construction and design build services…

Continue Reading >

In the News

Technology Advisors Examine Ransomware After the Baltimore Cyber Attack

Technology Advisors Examine Ransomware After the Baltimore Cyber Attack

Technology Security Advisors, Richard Staton and David Warnick of CMIT Solutions of Upper Chesapeake, outline the current state of cyber threats after the Baltimore...

Continue Reading >
Data Security Expert Defines Robocalls and How to Stop Them

Data Security Expert Defines Robocalls and How to Stop Them

Security Expert and President of CMIT Solutions of Capitol Hill, Anne Morrison, discusses the details of Robocalls and how to stop them. In 2017...

Continue Reading >
How to Keep Your Tax Information Safe

How to Keep Your Tax Information Safe

Information security expert and owner of CMIT Solutions of Charlottesville, Thomas Beck lays out the best practices for keeping your information safe. Tax season...

Continue Reading >
How to File Your Taxes Safely and Securely

How to File Your Taxes Safely and Securely

CMIT Solutions cybersecurity and technology expert, Ed Cordiano, outlines how to stay safe during tax season. File your taxes safely and securely with these...

Continue Reading >

RELIABLE SUPPORT + PROVEN VALUE

Contact us today to learn more about what CMIT offers as Your Technology Team.