Articles - Managed IT & Cybersecurity for Small Businesses - Simplified Solutions

Articles

Search returned 24 total results.

Ben Loveless Dec 11, 2025
When a Browser Alert Isn’t What It Seems: How Push Notifications Are Being Abused for Attacks

Cybercriminals are leveraging browser push notifications in sneaky new ways, using a toolkit called Matrix Push C2 to send fake alerts, phishing links, and malware redirects. This article explains how these attacks work, why individual vigilance matters, and what steps you can take to spot and block suspicious notifications before they lead to compromise.

Best Cybersecurity Services for Small Businesses: What to Look for in an MSP

Choosing the right cybersecurity provider can feel overwhelming. This guide explains what actually matters when evaluating MSP cybersecurity services, so small businesses can make confident, informed decisions.

Ben Loveless Mar 27, 2026
Ben Loveless Nov 8, 2025
New Microsoft Teams Trick: How Matanbuchus Is Being Delivered and What to Do If You’re Affected

Attackers are abusing collaboration tools like Microsoft Teams to trick users into running scripts that deploy the Matanbuchus loader, which gives criminals a quiet foothold on Windows systems. This article explains what Matanbuchus does, why Teams and Quick Assist are effective vectors, and how to discover and remove the loader if you find it on your devices.

Cybersecurity Solutions for SMBs: DIY vs Managed Services

Should your business handle cybersecurity internally or work with a managed provider? This guide breaks down DIY vs managed cybersecurity for SMBs, helping you understand the trade-offs and make the right decision.

Ben Loveless Apr 2, 2026
Ben Loveless Jan 16, 2026
Why Cloud-Hosted Servers Still Need Cybersecurity Protection

Moving servers to the cloud can improve reliability and scalability, but it does not eliminate cybersecurity risk. This article explains why virtual machines still require device-level protection and how modern attacks target cloud-hosted systems.

How to Tell if Your Business Is Already Compromised

Cyberattacks don’t always announce themselves. This guide explains the most common signs that a small business may already be compromised and what to do next.

Ben Loveless Apr 24, 2026
Ben Loveless Oct 29, 2025
How to Determine the Distribution Type and Architecture of Your Computer

Before generating your installer, it helps to know your computer's operating system, distribution type, and architecture. This quick guide walks you through how to find that information on Windows, macOS, and Linux, so you can select the correct options on the installer page.

Cybersecurity for Businesses of Any Size

Cybersecurity isn’t just for large corporations with big IT teams. Learn about our mission to make this possible.

Ben Loveless Sep 26, 2025