RKL eSolutionsBlogs

5 Best Practices for Keeping your Data Secure Online

This year at the Lancaster County Chamber of Commerce EXPO, our team ran dark web searches of visitors and their businesses. Of the dozens of searches that we ran throughout the event, only THREE came up clean, meaning the majority of visitors to .

Continue reading
Tagged With: Technology, Cyber Security

The time to secure your digital activity is now.

The prevalence of the Internet in business today has opened us up to a world of opportunity. We can streamline processes, access data and connect teams and remote offices like never before. Unfortunately over all of these benefits of doing business .

Continue reading
Tagged With: Cyber Security

Alert! Calls from Sage Renewal Impostor

Beware of suspicious calls from Sage impostors  By now, most people are aware of phishing scams and how to recognize suspicious emails from unknown senders or emails that contain strange hyperlinks. But what happens when the impostor calls you .

Continue reading
Tagged With: Cyber Security

Discussion: How Disaster Recovery Plans Protect you from Cyber Threats

  We sat down with our business partner Joe Cudzik from Expedient to discuss cyber security and how small and midsized businesses can protect themselves from malicious attacks. 1. Can you provide an overview of Expedient? Expedient is a service .

Continue reading
Tagged With: Cyber Security

Increasing Need for Cyber Insurance

  Preparing for Data Breach Storing data, whether customer or proprietary, is a key part of any organization. As the reliance upon computers and networking has become essential for businesses to remain competitive, it comes with a new set of .

Continue reading
Tagged With: Cyber Security

Protecting Yourself and Contacts from Phishing Emails

It seems that dangerous phishing emails has become a regular to many inboxes. What: a business contact and friend of mine had his business email account “cleverly hacked” (his words, whatever that means). As a result, I received a dangerous phishing .

Continue reading
Tagged With: Cyber Security

Alert! Identify Phishing Scams

Beware of suspicious emails posing as our employees By now, most people are aware of phishing scams and how to recognize suspicious emails from unknown senders or emails that contain strange hyperlinks. But what happens when the email appears to be .

Continue reading
Tagged With: Cyber Security

Protect your Sage Investment from Ransomware

  How to Be Proactive With Cyber Security Within the past 60 days, three of our Sage customers have been victims of Ransomware. In all cases, the Ransomware directly ‘attacked’ the Sage databases and brought the operational processing to a halt. .

Continue reading
Tagged With: Cyber Security

Questions? Need Support?
Get in Touch

Which solution WORKS BEST for your business?

»Take this quiz to find out!

Find the Solution that WORKS BEST for your Business!

close