(904) 208-2195

The Evolution of IT Managed Services

September 16th, 2020 by admin

At the outset of enterprise computing, information technology services and management were focused on a break/fix basis, meaning computer systems were only managed by an expert when they did not work, necessitating a technician to come out to fix it. This technician may also have been the person who...

Read Full Story »

Posted in: Security, Solutions

The Top 5 Cyberattacks of August 2020

September 9th, 2020 by admin

We talk about cybersecurity all the time because it's the #1 concern of our clients. That's why we partner with smart cybersecurity solution firms like Arctic Wolf to deploy the best tools available for our clients. Our Arctic Wolf offerings for managed services clients include managed detection and...

Read Full Story »

Posted in: Security, Solutions

The Case for Two-Factor Authentication

September 1st, 2020 by admin

We always recommend our client partners setup and maintain 2-factor authentication for their organizations. And the basis of that strong recommendation is simple, and it's the only fool-proof secure way to ensure passwords are not compromised. Two-factor authentication (2FA) lets you protect valuable...

Read Full Story »

Posted in: Security, ICX

Free Webinar with Datto | Your Secret Weapon Against Cybercrime

July 1st, 2020 by admin

We are excited to announce we have partnered with Datto to bring you an info-packed webinar on July 28 that 10 am EST called Your Secret Weapon Against Cybercrime. Hosts Desraie Thomas, Channel Development Manager from Datto, and COO Justin Kane from ICX will explain some of the common cybersecurity...

Read Full Story »

Posted in: Managed IT Services, Security, ICX

Managed IT Services Designed for Your Business

June 24th, 2020 by admin

Having issues with your network? No need to worry, our support team has got your back! The quality of our service is unmatched in Florida. We employ a tailored approach by studying the framework of your IT setup and leveraging our knowledge and expertise in Managed IT services to maximize the performance...

Read Full Story »

Posted in: Managed IT Services

Please Join Us for a Webinar: Securing Communications in the Digital World

May 27th, 2020 by admin

June 16, 2020 11:30 a.m ET | 12:30 p.m. Central Jaysin Nguyen Sr. Staff Engineer, Security RingCentral Dean Young RVP Partner Sales - East RingCentral Please join RingCentral for a quick 30-minute discussion on how I.T. departments are addressing and enhancing the security of their communication...

Read Full Story »

Posted in: Webinar

How to Stop Inside Security Threats

May 11th, 2020 by admin

While most businesses are focused on external security threats, there are two kinds of internal threats that deserve equal consideration and mitigation. Both accidental and intentional threats come in a lot of shapes and sizes, but there are some simple ways you can protect your organization. In a...

Read Full Story »

Posted in: Security

7 Important Security Measures for Working Remotely

April 15th, 2020 by admin

Working remotely has suddenly become a necessity, but personal devices and unsecured internet connections can leave employees vulnerable to a variety of cyber threats. Fortunately, there are a few simple steps you can take to safeguard you and your customer's data. #1 Make sure your PC is password...

Read Full Story »

Posted in: Security

Set Up Your Remote Workers for Success and Security

April 8th, 2020 by admin

While everyone scrambled over the last few weeks to get laptops and send in-office employees to work from home, a few essential tools may have been overlooked in the process. Many small business owners may not realize that the network and PC monitoring tools they had set up in the office may not translate...

Read Full Story »

Posted in: Managed IT Services, Solutions, Support

Alert | Cybercrime Increase Due to COVID-19

March 25th, 2020 by admin

We are closely monitoring the impacts to our customers of COVID-19. One that has come to our attention is that cybercrime has dramatically increased over the last few days, and hackers are using COVID-19 to disguise emails to gain access to company and personal information. Please read this relevant...

Read Full Story »

Posted in: Security, ICX, Support

Network Threat Assessments for Today’s Aggressive and Evolving Threat Landscape

February 19th, 2020 by admin

Today’s workplaces have changed – workers are mobile and they want around-the-clock access to networks from a myriad of devices of their choosing from locations around the world. This evolution has changed the way businesses need to think about and administer network security. To combat the myriad...

Read Full Story »

Posted in: Security

Cybersecurity Managed Detection and Response Explained

January 27th, 2020 by admin

Comprehensive cybersecurity sounds like an impossible-to-achieve oxymoron in today’s highly digital and vulnerable world. But it’s not. We partner with Arctic Wolf to provide comprehensive managed detection and response for your business with 24x7 monitoring that provides on-going, behind-the- scenes...

Read Full Story »

Posted in: Security

Office 365 'Password Expiring' Phishing Scam

January 8th, 2020 by admin

This is an important alert for all our Microsoft Office 365 users. This scam originally came up last summer but it has been making the rounds again so we wanted to bring it back up. If you have received an email with a subject line something like, "Office 365 Password About to Expire" claiming...

Read Full Story »

Posted in: Security

Holiday Scams and Malware Alert

December 18th, 2019 by admin

The Department of Homeland Security’s Cyber Infrastructure (CISA) division released an alert on currently circulating online browsing/shopping scams and malware campaigns you should be aware of. The alert warns about fake ads or shipping notifications, which may include attachments infected with malware....

Read Full Story »

Posted in: Security

5-Minute Cybersecurity Training Guide for Your Employees

November 26th, 2019 by admin

Teaching your employees how to be cyber-conscious and take precautions is an important part of your company's overall security awareness training. That's why we felt it was important to share this e-book from our partner Arctic Wolf that breaks down some important cybersecurity issues and how to approach...

Read Full Story »

Posted in: Security

The Benefits of Excellent Network Maintenance

November 6th, 2019 by admin

As discussed in last week’s blog, Why All Networks Require Maintenance, it is clear how important consistent on-going network maintenance is to your businesses’ security and productivity. Good network maintenance doesn’t have to cost an arm and a leg but it should be comprehensive. When done right,...

Read Full Story »

Posted in: Solutions

Prevent Ransomware Attacks with Access Controls and Good PAM Practices

October 23rd, 2019 by admin

Modern businesses are all struggling with the growing threat of ransomware attacks. We deal with them all the time here at ICX, often spotting them and stopping them before our clients even become aware they are happening. The consensus on the best way to prepare for the eventuality of a ransomware...

Read Full Story »

Posted in: Security

How a Real Phishing Attack Can Happen

October 9th, 2019 by admin

We recently dealt with a very sneaky phishing attack and wanted to share it so you don’t fall victim to this too! A client looked up what they thought was the customer service team for the software they were having issues with. However, what they found online was a fake customer service number that...

Read Full Story »

Posted in: Security, ICX

The Real Costs of Data Breaches

September 18th, 2019 by admin

As time marches on, cyberattacks grow more sophisticated, more malicious, and more widespread. And with advanced cybercriminals finding new ways into organizations, businesses of every size risk being attacked. So, today’s companies need to understand what the consequences will be if, and when, it happens....

Read Full Story »

Posted in: Security, Solutions, Support

8 Metrics to Help Quantify Your Businesses' Cyber Risk

September 11th, 2019 by admin

Cybersecurity is an important topic for our clients, but it encompasses a lot of different things. Managing cyber risk entails dealing with sprawling networks, endpoints ranging from work PCs to personal smartphones, and cybercriminals using increasingly sophisticated methods for launching attacks....

Read Full Story »

Posted in: Security

Patch Management 101

August 21st, 2019 by admin

One of the important services we provide clients here at ICX is patch management. But what does that even mean? A patch is a change to a computer program that is designed to update, fix, or improve it by securing vulnerable areas. Patches aim to: Fix security vulnerabilities Implement bug fixes Improve...

Read Full Story »

Posted in: Security, Solutions, Support

Spoofing is Sneaky - Learn How to Avoid a Spoofing Attack

August 7th, 2019 by admin

Spoofing is a sneaky type of online fraud that tricks users and networks into believing that information is real when it’s actually fake. Typically, a cybercriminal will pose as a known, trusted person in your network (office typically) and they will try to get personal information, money, or help...

Read Full Story »

Posted in: Security

The Real Value of IT Managed Services to CEOs

July 3rd, 2019 by admin

The value of ‘managed’ or ‘outsourced IT services’ are many, but it comes down to risk vs. reward. Businesses are always trying to cut overhead while gaining revenue. It’s that delicate balance between output and earnings every CEO walks. And maintaining a secured, always-on...

Read Full Story »

Posted in: IT, Managed IT Services, Security, Solutions


Our Office

Request a Consultation – Contact Us

Copyright © 2020 ICX Managed Services

Atomic8Ball Web Presence Management

Cal. Civ. Code § 1798.102 - Do Not Sell My Personal Information