Skip to content

Blog

Managed Service Provider Blog

SIEM vs. SOAR: What’s the Difference?

When we are talking about cybersecurity, it is important to understand certain basic concepts. Many of these concepts are also important to the practice of good physical security, and today’s
Read More
How to Overcome the Challenges of Securing a Fully Remote Workforce

How to Overcome the Challenges of Securing a Fully Remote Workforce

The use of a remote workforce presents certain advantages, both for employers and employees. The need for a more convenient system (combined with the demands of a global pandemic) has
Read More

What Is Network Visibility And How Is It Maintained?

It is no secret that thieves always hide in dark corners. Like rats or roaches, they seek out the areas where you don’t go…and once there, they propagate. Many malware
Read More

Monitoring Suspicious Network Activity With SIEM

SIEM is a type of software that is intended to serve as an early warning system against cyber attacks of all kinds. One might compare it to traditional antivirus software,
Read More
What Should I Look For When Choosing A Cloud Provider?

What Should I Look For When Choosing A Cloud Provider?

There are so many cloud providers out there, and all of them will claim to be the best. You can’t necessarily judge by the reviews alone, either, because some of
Read More

PCH Technologies Ranked No. 43 on Channel Futures MSP 501 List 2021

Annual MSP 501 Identifies Industry’s Best-in-Class Businesses Growing Via Recurring Revenue and Innovation PHILADELPHIA, PA, UNITED STATES, July 8, 2021 — PCH Technologies has been named as one of the world’s premier managed
Read More

Cost of Cyber Attacks vs. Cost of Cyber Security in 2021

We have heard some people complain that cybersecurity services are too expensive. While most find these expenses to be worthwhile, we wanted to address this argument and show why it
Read More

Even Your IT Provider Can Be a Conduit of Ransomware

Over the holiday weekend, another vicious ransomware attack was carried out with Kaseya remote management software used by IT providers to remotely control end-user systems and automate the deployment of security patches. Kaseya’s remote management software was subject to
Read More
Ransomware-as-a-Service (RaaS): How It Works

Ransomware-as-a-Service (RaaS): How It Works

As if ransomware didn’t cause enough problems, the situation has now become even worse. The growth of RaaS (Ransomware as a Service) has made it easier than ever for people
Read More
Threat Detection and Response: How to Stay Ahead of Advanced Threats

Threat Detection and Response: How to Stay Ahead of Advanced Threats

Threat detection and response are two of the most important aspects of any cybersecurity plan. In fact, some would say that they are the most important aspects. You cannot respond
Read More
Ransomware vs Social Engineering: What’s The Difference?

Ransomware vs Social Engineering: What’s The Difference?

Let’s face it: We will never have a world in which everyone is a cybersecurity expert. Besides, not everyone needs to have that degree of knowledge. However, everyone needs to
Read More
What is An Intrusion Detection System?

What is An Intrusion Detection System?

Just as a physical building must be secured from intruders, so too must a digital network. Once they gain covert entry into a particular system and/or network, cyber attackers have
Read More

Managed Service Provider Blog

Client Testimonials

Don’t just take our word – hear what our clients have to say about our IT support and cyber security services.

Christopher Toppi
Compass Wire Cloth – vp sales

Jim Donnelly
ASL Transportation – president/ceo

Interested in Learning How PCH Cyber Security can help you cut
costs and Increase Business Productivity?

Download our Free ebook to learn more

FREE CYBER SECURITY EBOOK