by Travis Strong | Apr 17, 2026
Key Takeaways Cybercriminals are actively using AI to create more convincing phishing attacks and more sophisticated intrusion attempts. Employee training is your first and most important line of defense and it needs to be ongoing, not a once-a-year event. Strong...
by Travis Strong | Mar 10, 2026
Key Takeaways Iranian-linked threat actors have launched cyberattacks including, DDoS, ransomware, and espionage campaigns, in the wake of U.S. and Israeli military strikes against Iran. While current activity is concentrated in the Middle East, security researchers...
by Jeff Rapp | Feb 13, 2026
Key Takeaways Every third-party relationship introduces potential risk to your business, whether it’s a vendor, supplier, or software provider Supply chain attacks are now a daily occurrence, targeting businesses of all sizes A robust vendor compliance program...
by Travis Strong | Dec 30, 2025
Your organization runs on relationships with customers, vendors, partners, and employees. Each of these relationships involves an exchange of information that keeps your operations moving forward. When someone shares their data with you, they extend trust. How you...
by Steve Grossenbaugh | Nov 21, 2025
You added IoT (Internet of Things) sensors to track equipment performance. Building automation systems to reduce energy costs. Connected cameras to monitor facilities. The return on your investment (ROI) was clear, the implementation straightforward, and the benefits...
by Travis Strong | Oct 31, 2025
Imagine this scenario: Your controller receives an email from your CEO asking her to wire funds for an urgent acquisition. The email address looks right. The tone matches. She calls the number in the email signature to confirm. A voice that sounds exactly like your...
by Travis Strong | Oct 31, 2025
A single phishing email can cost your company hundreds of thousands in one afternoon. No malware. No sophisticated hacking. Just one employee, one click, and one wire transfer to the wrong account. Cyber risk is a business risk that can halt revenue, disrupt...
by Travis Strong | Oct 27, 2025
Imagine this: A mid-sized manufacturer in Northeast Ohio loses access to their production schedules for 16 days. Not because of equipment failure or a power outage. Ransomware has encrypted everything, including their backup systems. Recovery costs and lost production...
by Travis Strong | Oct 9, 2025
October marks National Cybersecurity Awareness Month, making it the perfect time to examine how well your business stands against cyber threats. Many business owners are winging their cybersecurity approach, and that’s a costly mistake. The reality is stark:...
by Steve Grossenbaugh | Sep 30, 2025
Rea Information Services (RIS) has been recognized as a Best of Tech 2025 honoree, highlighting the firm’s role as a leader in delivering innovative IT strategy, cybersecurity, and technology solutions to organizations across Ohio and beyond. The Best of Tech Awards,...
by Steve Grossenbaugh | Sep 16, 2025
This article summarizes key insights from Rea’s recent webinar on technology management for not-for-profit organizations. Watch the full webinar recording for detailed strategies and additional resources. Your organization’s Windows 10 computers become...
by Travis Strong | Sep 15, 2025
At 3 PM on a Tuesday, your information technology person discovers suspicious network activity. Under House Bill 96, you have 7 days to report this to the state. Do you know who to call first? Can you distinguish between a reportable incident and routine IT...
by Jeff Rapp | Sep 11, 2025
Most business owners buy technology to solve yesterday’s problems. Successful ones buy technology to capture tomorrow’s opportunities. The difference isn’t what they buy, it’s how they think about buying it. Let’s be honest, you’ve...
by Steve Grossenbaugh | Sep 5, 2025
Strategic Technology Planning: Your Blueprint for Business Growth and Maximum ROI In today’s competitive landscape, growth-minded businesses can’t afford to leave technology to chance. Whether you’re in construction, manufacturing, healthcare, or...
by Steve Grossenbaugh | Sep 4, 2025
Is Your IT Strategy Keeping Pace with Your Growth? Your business has been successful. You’ve built something meaningful, created jobs, and serve your customers well. But lately, you might be noticing some warning signs: systems that used to work fine are now...
by Steve Grossenbaugh | Aug 19, 2025
As summer winds down and businesses shift gears for fall, it’s easy to think the slower pace of vacation season means fewer risks. But in the world of cybersecurity and data protection, the opposite is often true. Cybercriminals don’t take summer...
by Jeff Rapp | Jul 17, 2025
Summer is here, and your team deserves a well-earned break. But what happens when your IT person heads off for that long-awaited vacation? Or when multiple team members are out enjoying their PTO at the same time? If you’re like most businesses, the thought of...
by Travis Strong | Feb 14, 2025
Your business faces new types of threats as you and your customers and suppliers use information technology. Even if your business primarily uses basic technology, you may still need to interact with more advanced digital systems for orders, banking, or customer...
by Travis Strong | Oct 3, 2024
In our increasingly digital world, Artificial Intelligence (AI) has become a buzzword that’s impossible to ignore. But what exactly is AI, and why does it matter to your business? Understanding AI: A Brief Overview Artificial Intelligence refers to computer systems...
by Travis Strong | Aug 19, 2024
Businesses of all sizes face an increasing array of cyber risks. As your trusted advisors, we want to shed light on three prevalent threats that could impact your business: ACH fraud, payment redirects, and business email compromise (BEC) schemes. Understanding these...
by Travis Strong | Mar 20, 2024
Cybersecurity has become a necessary defense for all businesses and organizations. It can no longer be ignored. One of the most common and insidious threats we continue to face is phishing, likely because the bad actors are still successful at getting us to fall for...
by Jeff Rapp | Feb 19, 2024
Cybersecurity is a crucial aspect of modern business. But let’s keep it simple: just like you protect your personal belongings, your company’s digital assets need safeguarding too. This is where cybersecurity steps in, acting like an invisible shield for your...
by Travis Strong | Feb 16, 2024
As we approach another tax season, it’s not just the crunch of numbers that should be on our minds but also the heightened risk of falling prey to cyber scams. The Internal Revenue Service (IRS), following its eighth annual Security Summit, has issued an early...
by Travis Strong | Jan 18, 2024
In the vast expanse of the digital age, the nexus between technology and privacy compels businesses to assume a crucial role in safeguarding the data entrusted to them. As we approach Data Privacy Week 2024, it’s imperative to explore the intricate sides of this...