Articles - Managed IT & Cybersecurity for Small Businesses - Simplified Solutions

Articles

Search returned 24 total results.

Ben Loveless Nov 8, 2025
New Microsoft Teams Trick: How Matanbuchus Is Being Delivered and What to Do If You’re Affected

Attackers are abusing collaboration tools like Microsoft Teams to trick users into running scripts that deploy the Matanbuchus loader, which gives criminals a quiet foothold on Windows systems. This article explains what Matanbuchus does, why Teams and Quick Assist are effective vectors, and how to discover and remove the loader if you find it on your devices.

How to Tell if Your Business Is Already Compromised

Cyberattacks don’t always announce themselves. This guide explains the most common signs that a small business may already be compromised and what to do next.

Ben Loveless Apr 24, 2026
Ben Loveless Apr 17, 2026
What Happens If a Small Business Gets Hacked? (Step-by-Step Breakdown)

A cyberattack rarely happens all at once. This step-by-step breakdown shows how small business breaches typically unfold, from initial access to real-world impact.

When AI Becomes the Hacker: The New Threat from Autonomous Cyberattacks

Hackers reportedly used an AI system to carry out major cyberattacks with little human involvement - a milestone in cyberwarfare. This article explains what happened, how AI was used, why it poses a new kind of risk, and what organizations of any size can do to prepare and defend themselves.

Ben Loveless Nov 30, 2025
Ben Loveless Nov 2, 2025
5 Ways Churches Are Under Attack

Churches are increasingly targeted by cybercriminals. From phishing emails to ransomware and website defacement, faith-based organizations face the same digital threats as large companies, often without the same resources to prepare or protect themselves. Here are five ways churches are under attack and how to protect your congregation’s data and mission.

The Real Cost of a Cyberattack on a Small Business (With Examples)

A cyberattack can disrupt a small business far more than most owners expect. From downtime and ransom payments to legal costs and reputation damage, the real cost often extends well beyond the initial breach.

Ben Loveless Mar 6, 2026
Ben Loveless Dec 11, 2025
When a Browser Alert Isn’t What It Seems: How Push Notifications Are Being Abused for Attacks

Cybercriminals are leveraging browser push notifications in sneaky new ways, using a toolkit called Matrix Push C2 to send fake alerts, phishing links, and malware redirects. This article explains how these attacks work, why individual vigilance matters, and what steps you can take to spot and block suspicious notifications before they lead to compromise.

How to Determine the Distribution Type and Architecture of Your Computer

Before generating your installer, it helps to know your computer's operating system, distribution type, and architecture. This quick guide walks you through how to find that information on Windows, macOS, and Linux, so you can select the correct options on the installer page.

Ben Loveless Oct 29, 2025