Our Blog
Back to School Cyber Security Special
Are you SURE that you’re protected well enough? Can you tell your clients with 100% certainty that their data is secure? Do you ever stay [...]
Back to Cyber Security
What Businesses Need to Know Today to Protect Their Data and Their Clients’ Data By far my most popular presentation for Business Owners and Executives, [...]
Some People Gotta Learn the Hard Way
As a young investment advisor, I got my first taste of Fear Of Missing Out (FOMO) with the Beanie Babies craze. In 1995 the internet, [...]
Where Are You Going to Find Your Next Employee?
Where are you going to find your next employee, or replace one that is already on the way out the door, but you don’t know [...]
Client Spotlight: Brian Walton from Image Matters
Brian Walton is a Managed Print Specialist with Image Matters here in Knoxville. Through his integrity and customer-centric approach he has earned the spot of [...]
3 Ways To Use Technology To Prevent And Catch Financial Fraud
Small businesses handle more cash on a day-to-day basis than most individuals handle in a month. How do you fight against fraud and e-crime? Here [...]
Learn From The Best vCSOs Officer in Knoxville
JM Addington Technology Solutions is known for its cybersecurity expertise, and we’ll never stop learning. This is why, in May, Jonathan & Michael attended ongoing [...]
Cybersecurity Lingo: What is a “DDoS” ?
Cybersecurity Lingo: What is a "DDoS" ? "Distributed Denial of Service" [attack]. A DDoS attack happens when thousands or more of computers send traffic to [...]
Client Spotlight | William D King
William D King founded ABA Business Advisors (ABA) in 2011 to provide tax minimization strategies to the medical community and small businesses. With clients in [...]
Cybersecurity Lingo: What is a “botnet” ?
Cybersecurity Lingo: What is a "botnet" ? A botnet is a group of computers bad guys have under their control, usually thousands or more. Botnets [...]
Take a Break and Have Managed IT Services
According to WATE, Knoxville police pulled over a driver speeding down I-40 at over 100 MPH in May. Why? He said he needed to use [...]
Cybersecurity Lingo: What is a “zero day” ?
Cybersecurity Lingo: What is a "zero day" ? A zero day is the worst kind of security bug: a hole that is already in use [...]
Cybersecurity Lingo: What is a “CVE”?
Cybersecurity Lingo: What is a "CVE"? It is a unique ID for a specific security bug. This ID is unique to every bug ever found, [...]
Cybersecurity Lingo: What is a “malicious actor” or a “bad actor”?
Cybersecurity Lingo: What is a "malicious actor" or a "bad actor"? The rest of the world calls these people hackers. It's pretty simple. Inside computer [...]
Cybersecurity Lingo: What is an “Attack vector” ?
Cybersecurity Lingo: What is an "Attack vector" ? This is *how* a malicious actor enters your system. For instance, they may buy passwords on the [...]