Ronny Delgado

Ronny co-founded Internos in 2013, after co-owning ReadyIT alongside Jairo Avila for 12 years. When you ask Ronny about what he enjoys most about working at Internos, it should come as no surprise that his response is about the people here. He’s dedicated to the development of our company and passionate about making sure that we all succeed.
Insider Threat Indicators to Alert You

Insider Threat Indicators and Prevention Tips

March 23, 2023

Cyber threats are often assumed to come from outside  your company — even as far out as a foreign country. But many assumptions are often not true and too often the signs are ignored. These threats could come from across the room right within your own organization. Here’s more about insider threat indicators: First, realize…

Read More
Endpoint Backups or Shared System Data Backups (2)

Which Disaster Recovery Solution Is Better: Endpoint Backup or Shared System Data Backup?

March 16, 2023

Despite their epic name, disaster recovery services are not the most riveting of topics. But few IT subjects can match their impact on your business continuity. There are two basic types of backup solutions: Endpoint backup and shared system data backup. Each can be implemented with local servers or cloud computing (or both). We’ll take…

Read More
Reply Chain Phishing Attacks

Reply-Chain Phishing Attacks: What You Need to Know

November 10, 2022

As cyber security experts we are always looking out for new or trending threats. The latest is reply-chain phishing attacks. The idea behind these types of fraudulent emails is to trick victims into opening malicious links or attachments. It can take months or even years to recover from a cyber attack. Fortunately, your business isn’t…

Read More
Ransomware as a Service

Ransomware as a Service (RaaS) Increases Your Cyber Risk (and What to Do About It)

June 9, 2022

By now, you know that cybercriminals are smart and that they have become so adept and villainous they can force businesses to bow to their will. But did you know that they don’t even need hacking skills to do it? They simply buy software packs from criminal entities that have the skills — and then…

Read More
Cyber Security Measures image

Cyber Security Measures Don’t Have To Kill Productivity

April 14, 2022

It’s all a matter of balance. With the right managed service provider,  productivity does not need to fall victim to cyber security measures.  You can strengthen your cyber security without killing productivity.  Your staff needs to accomplish the day-to-day tasks of your business easily, without having to fight an uphill battle to gain access to…

Read More
Multifactor Authentication Survival Guide image

The Multifactor Authentication (MFA) Survival Guide

March 17, 2022

Adding security measures into a busy workplace can be daunting, and few security measures hit as many people in your organization as multifactor authentication (aka multi factor authentication or MFA). But there is no need to fear: With the right IT support partner, you can not only have a smooth multifactor authentication rollout, but a…

Read More
IT Support for Small Business image

IT Support for Small Business: Hiring an MSP for Your SMB

February 17, 2022

Whether you are considering hiring a  managed service provider (MSP) for the first time or not sure if the one you have is right for you, this post can help. It outlines the many benefits of managed IT support for small business, as well as how quality MSPs help your SMB succeed and grow. Benefits…

Read More
IT provider image

IT Provider Red Flags: Is It Time to Break Up With Your MSP?

January 13, 2022

Are you getting the service you need out of your IT provider? It may be time to move on and find a new MSP. Most IT providers offer a full range of IT support services including cloud migration, cyber security and disaster recovery.  Here are 10 red flags that could signal that your IT provider…

Read More
file sharing image

File Sharing Dangers and Best Practices

December 23, 2021

Everyone shares files whether it’s a photo, an email or a message to someone we know. But the way those files are shared can literally give hackers the key to all your other data. It’s very easy these days to inadvertently share a file in a way that opens up a back door to all…

Read More
The Social Engineering Attack Cycle

The Social Engineering Attack Cycle: How Hackers Gain Your Trust in 4 Steps

October 7, 2021

Criminals get the information they use to breach your company in what is called the social engineering attack cycle. But you don’t have to be an expert on the social engineering framework to protect your business. A good managed service provider will train your team on how to prevent phishing attacks and other cyber security…

Read More