Security

Every piece of hardware equipment, every piece of software, every email account and every unsecured password is an unlocked door into the backend of your computer system. These days data breach is a daily occurrence and if it affects big companies like Yahoo and Target, you bet it can affect you too.  There are regulations specific to key industries that ensure data protection. Are you in compliance?
Find articles on IT Security, hardening your systems and meeting compliance regulations …

Building a Foolproof IT Security System

Building a foolproof IT security system is impossible because even the most innocuous and altruistic of actions can expose massive vulnerabilities. True strength is derived from your response and reaction to those incidents.

An overnight alert notified us that one of our clients — a school — was running low on disk space. Using a great utility called WinDirStat, which … Read more...

Prevent Data Loss – Backup Today

How much data would you have to lose before it began to hurt your business? The answer is not very much. Depending on what data is lost, it may only take no more than a file or two to cause havoc and create chaos.

Did you know that 70% of people have never backed up a phone, computer, tablet or … Read more...

Busting The Myths of Hollywood Hacking

Hacking in the movies is cool, no question. Completely inaccurate, but SO COOL.

Lately, it seems as though there is some story about hacking every day on the news. Both political parties are talking about it non-stop, there was the Wannacry virus that took the world by storm for a few days, and every Russian with a smartphone is now … Read more...

Why You’re A Risk To Be Hacked And What You Can Do About It Now

Most companies look at hacking as a NIMBY situation. NIMBY stands for Not In My Backyard. It’s usually used to describe the reaction from homeowners or the general public when something questionable — like a landfill or a prison — is scheduled to be built in their neighborhood. Everyone understands the need for landfills and prisons, but nobody wants them … Read more...

Top 5 Security Concerns for Small Business Owners

Many people look at security as a binary issue — either you are or you aren’t. But in reality, security is more like 50 Shades of Grey.

Security can cover a lot of different areas of a business, ranging from physical security to information security. Here are the top five conversations you should be having about your security policies and … Read more...

How To Test a Disaster Recovery Plan

The things that cause us the greatest disruption are those that are the least expected.

The tragic events unfolding in Texas and the storm that is heading toward Florida are opportune times for us to ask an important question: How quickly would your business be able to recover from a disaster?

I’m going to go out on a limb and … Read more...

Tips For Effective Smartphone & Tablet Security

smartphone security tipsEmployees at businesses of all shapes and sizes take home the keys to their companies every night. Virtual keys, that is.

Smartphones and tablets are gateways into a business. The devices that parents give to their kids during dinners out to enjoy a moment of peace and quiet can also open up a company to any kind of breach or … Read more...