Every piece of hardware equipment, every piece of software, every email account and every unsecured password is an unlocked door into the backend of your computer system. These days data breach is a daily occurrence and if it affects big companies like Yahoo and Target, you bet it can affect you too.  There are regulations specific to key industries that ensure data protection. Are you in compliance?
Find articles on IT Security, hardening your systems and meeting compliance regulations …

Why You’re A Risk To Be Hacked And What You Can Do About It Now

Most companies look at hacking as a NIMBY situation. NIMBY stands for Not In My Backyard. It’s usually used to describe the reaction from homeowners or the general public when something questionable — like a landfill or a prison — is scheduled to be built in their neighborhood. Everyone understands the need for landfills and prisons, but nobody wants them … Read more...

Top 5 Security Concerns for Small Business Owners

Many people look at security as a binary issue — either you are or you aren’t. But in reality, security is more like 50 Shades of Grey.

Security can cover a lot of different areas of a business, ranging from physical security to information security. Here are the top five conversations you should be having about your security policies and … Read more...

How To Test a Disaster Recovery Plan

The things that cause us the greatest disruption are those that are the least expected.

The tragic events unfolding in Texas and the storm that is heading toward Florida are opportune times for us to ask an important question: How quickly would your business be able to recover from a disaster?

I’m going to go out on a limb and … Read more...

Why Would I Be at Risk of Hacking?


“I don’t have anything worth hacking.”

First, don’t be so hard on yourself. Find a mirror, look at yourself in it, and repeat after me: I’m good enough. I’m smart enough. And, doggone it, people like me.

Second, and more importantly, whether you think you have anything worth hacking is irrelevant. A hacker can’t make that determination until after he


Tips For Effective Smartphone & Tablet Security

smartphone security tipsEmployees at businesses of all shapes and sizes take home the keys to their companies every night. Virtual keys, that is.

Smartphones and tablets are gateways into a business. The devices that parents give to their kids during dinners out to enjoy a moment of peace and quiet can also open up a company to any kind of breach or … Read more...