Security

Every piece of hardware equipment, every piece of software, every email account and every unsecured password is an unlocked door into the backend of your computer system. These days data breach is a daily occurrence and if it affects big companies like Yahoo and Target, you bet it can affect you too.  There are regulations specific to key industries that ensure data protection. Are you in compliance?
Find articles on IT Security, hardening your systems and meeting compliance regulations …

NonProfits of Connecticut  – you have a unique advantage that ends within 30 days.

The Connecticut Department of Emergency Services and Public Protection has a total of $5 million allocated for reimbursement to nonprofit organizations throughout the state for costs associated with implementing needed security infrastructure improvements.

This is huge – because in our current situation, the hackers and evil … Read more...

A hacker-proof system is all about your company’s software. What you have and how you use it will make or break any form of security your company tries to enforce to protect against data leaks, spam, viruses, and malware.

The steps needed to fortify a company’s network are extensive, but there are frontline defenses that are essential to keeping your … Read more...

It happens all too often, where a company employee is targeted by a scam or hack attempt and the crook wins. One of my client’s employees fell victim to a mobile phishing scam their first week on the job. They received a text message from someone claiming to be their new boss by asking them to purchase gift cards to … Read more...

On average, companies across the globe lose over 400 billion dollars annually due to cybercrime. That’s a huge number that is growing each year. Small businesses often believe themselves to be too small to be at risk of cybercrime; however, small businesses are often the most targeted by hackers.

The reason small businesses are more at risk is that they … Read more...

Building a foolproof IT security system is impossible because even the most innocuous and altruistic of actions can expose massive vulnerabilities. True strength is derived from your response and reaction to those incidents.

An overnight alert notified us that one of our clients — a school — was running low on disk space. Using a great utility called WinDirStat, which … Read more...

How much data would you have to lose before it began to hurt your business? The answer is not very much. Depending on what data is lost, it may only take no more than a file or two to cause havoc and create chaos.

Did you know that 70% of people have never backed up a phone, computer, tablet, or … Read more...

Hacking in the movies is cool, no question. Completely inaccurate, but SO COOL.

Lately, it seems as though there is some story about hacking every day on the news. Both political parties are talking about it non-stop, there was the Wannacry virus that took the world by storm for a few days in 2017, and every Russian with a smartphone … Read more...

Most companies look at hacking as a NIMBY situation. NIMBY stands for Not In My Backyard. It’s usually used to describe the reaction from homeowners or the general public when something questionable — like a landfill or a prison — is scheduled to be built in their neighborhood. Everyone understands the need for landfills and prisons, but nobody wants them … Read more...

Many people look at security as a binary issue — either you are or you aren’t. But in reality, security is more like 50 Shades of Grey.

Security can cover a lot of different areas of a business, ranging from physical security to information security. Here are the top five conversations you should be having about your security policies and … Read more...

The things that cause us the greatest disruption are often those that are the least expected.

The tragic events occurring this year, both locally and globally, present an opportune time for us to ask an important question: How quickly would your business be able to recover from a disaster?

I’m going to go out on a limb and say you … Read more...