Provider vs. Partner: Why It Matters

With the continuing rise of ransomware and other malware, it’s never been more important for a business to make good decisions in choosing an IT provider. Every day brings news of new breaches, and for a small or midsize business a hacking incident can be an existential threat. There’s no shortage of potential IT solutions […]

The New Maryland Tech Tax

By now you’ve heard that the Maryland legislature has enacted a new 3% tax on technology services, to take effect on July 1. You probably have questions about how this will affect your business, and frankly, not all of the details have been resolved yet. Let’s take a look at what we do know: As […]

10 Cybersecurity Mistakes Businesses Make

Ransomware and other malware continue to be existential threats for businesses of all sizes. Statistics on the number and cost of attacks vary widely, but breaches and attempted breaches continue to grow. Here’s a look at some common errors businesses make with their cyber defenses: Weak passwords: We know how tired you are of hearing […]

Mind the Gaps: CMMC Compliance by the Numbers

For more than two years now, we’ve been issuing regular reminders about mandatory CMMC compliance for organizations handling federal contract information (FCI) or controlled unclassified information (CUI). We’ve followed the long and winding journey of the CMMC rule from proposal to revision to adoption as the law of the land. While some may view CMMC […]

Why “Going Offline” Won’t Save You from Cyberattacks

During a recent chat with a potential client, we heard a familiar cybersecurity strategy: “We stay offline as much as possible—hackers can’t attack what they can’t reach, right?” It sounds logical. But unfortunately, it’s a risky misconception. Staying disconnected really a viable strategy against ransomware or other malware? Not really, and here’s why: Staying offline […]

Using AI Securely in Business

Maybe your use of artificial intelligence is limited to having ChatGPT rewrite the occasional proposal or business plan. Or perhaps you’ve instituted chatbots to answer common customer inquiries, or you’ve deployed AI solutions to streamline accounting or bookkeeping. Many businesses are just beginning to discover the potential of AI, while others are jumping in with […]

A Perfect Ten: Hill Tech Solutions Celebrates a Decade in Business

Hill Tech Solutions celebrates ten years in business this week, and we’re very proud to have reached this milestone. Enduring and thriving for a full decade in any industry is difficult, but amid the constant and rapid changes in the world of information technology, the challenges are even greater. It would be nearly impossible to […]

What Time Is It? CMMC Time.

On December 16, the final CMMC 2.0 rule went into effect. As you know, CMMC 2.0 is an updated cybersecurity standard affecting those organizations that handle federal contract information (FCI) or controlled unclassified information (CUI), as well as their subcontractors. While there has been some discussion over whether the rule will change as a new […]

CMMC 2.0 – Why Certifications Matter

CMMC (Cybersecurity Maturity Model Certification) 2.0 is now the law of the land, and compliance is no longer optional for any organization handling federal contract information (FCI) or controlled unclassified information (CUI). As you undertake your journey towards CMMC 2.0 compliance, you’ll encounter a number of acronyms related to the professional certifications of the providers […]

Social Media and Social Engineering: You Are the Weakest Link

In today’s environment of rampant data breaches and ransomware attacks, the focus often turns to hardware and software solutions. These are a vital part of any organization’s defenses, to be sure, and should be regularly maintained and updated. In most cases, however, the biggest threat to an organization’s cybersecurity standing is not in a computer, […]