Ronny Delgado

Ronny co-founded Internos in 2013, after co-owning ReadyIT alongside Jairo Avila for 12 years. When you ask Ronny about what he enjoys most about working at Internos, it should come as no surprise that his response is about the people here. He’s dedicated to the development of our company and passionate about making sure that we all succeed.
Reply Chain Phishing Attacks

Reply-Chain Phishing Attacks: What You Need to Know

November 10, 2022

As cyber security experts we are always looking out for new or trending threats. The latest is reply-chain phishing attacks. The idea behind these types of fraudulent emails is to trick victims into opening malicious links or attachments. It can take months or even years to recover from a cyber attack. Fortunately, your business isn’t…

Read More
Ransomware as a Service

Ransomware as a Service (RaaS) Increases Your Cyber Risk (and What to Do About It)

June 9, 2022

By now, you know that cybercriminals are smart and that they have become so adept and villainous they can force businesses to bow to their will. But did you know that they don’t even need hacking skills to do it? They simply buy software packs from criminal entities that have the skills — and then…

Read More
Cyber Security Measures image

Cyber Security Measures Don’t Have To Kill Productivity

April 14, 2022

It’s all a matter of balance. With the right managed service provider,  productivity does not need to fall victim to cyber security measures.  You can strengthen your cyber security without killing productivity.  Your staff needs to accomplish the day-to-day tasks of your business easily, without having to fight an uphill battle to gain access to…

Read More
Multifactor Authentication Survival Guide image

The Multifactor Authentication (MFA) Survival Guide

March 17, 2022

Adding security measures into a busy workplace can be daunting, and few security measures hit as many people in your organization as multifactor authentication (aka multi factor authentication or MFA). But there is no need to fear: With the right IT support partner, you can not only have a smooth multifactor authentication rollout, but a…

Read More
IT Support for Small Business image

IT Support for Small Business: Hiring an MSP for Your SMB

February 17, 2022

Whether you are considering hiring a  managed service provider (MSP) for the first time or not sure if the one you have is right for you, this post can help. It outlines the many benefits of managed IT support for small business, as well as how quality MSPs help your SMB succeed and grow. Benefits…

Read More
IT provider image

IT Provider Red Flags: Is It Time to Break Up With Your MSP?

January 13, 2022

Are you getting the service you need out of your IT provider? It may be time to move on and find a new MSP. Most IT providers offer a full range of IT support services including cloud migration, cyber security and disaster recovery.  Here are 10 red flags that could signal that your IT provider…

Read More
file sharing image

File Sharing Dangers and Best Practices

December 23, 2021

Everyone shares files whether it’s a photo, an email or a message to someone we know. But the way those files are shared can literally give hackers the key to all your other data. It’s very easy these days to inadvertently share a file in a way that opens up a back door to all…

Read More
social engineering attack cycle image

The Social Engineering Attack Cycle: How Hackers Gain Your Trust in 4 Steps

October 7, 2021

Criminals get the information they use to breach your company in what is called the social engineering attack cycle. But you don’t have to be an expert on the social engineering framework to protect your business. A good managed service provider will train your team on how to prevent phishing attacks and other cyber security…

Read More
define vulnerability image

What Is the Difference? Define Exploit, Vulnerability, Hacking and Cracking

September 9, 2021

As an MSP, Internos helps clients understand cyber security threats and protect their business. With words used interchangeably, it can be hard to pin down what they really mean. So this post will define exploit, vulnerability, hacking, cracking and other cyber security terms. Hacking vs Cracking Hacking is what you think it is: an intrusion…

Read More
Password Management image

No KIS Password Management Guide for the Office (and Beyond)

August 26, 2021

As a managed services provider for Miami area businesses, we provide cyber security services. That includes training teams on the best password management policies and tools. Here are some tips to help your business. The KIS philosophy reminds us to “keep it simple.” (We dropped the rude second S). KIS works in many areas of…

Read More