Stick with Security: Segment your network and monitor who’s trying to get in and out

used with permission from FTC.gov by Thomas B. Pahl, Acting Director, FTC Bureau of Consumer Protection Who’s coming in and what’s going out? Businesses that want to stick with security build commonsense monitoring into their brick-and-mortar operations. Whether it’s a key card reader at the door or a burglar alarm activated at night, careful companies … Continued

3 Security Advantages of Managed IT Services

Managed IT services, or outsourced remote network management, can help your business in many ways. It’s a cost effective way of having your IT infrastructure monitored and maintained by experts instead of hiring an IT director. Or, it can free up your IT director and IT staff to work on more important projects than daily … Continued

When is a Simple Data Backup Not Enough?

You know you need data backup, but when do you need a business continuity solution? If you’ve been paying attention to the news, you’ll know that massive global ransomware attacks are only growing in scale and frequency. These attacks and other threats and accidents that cripple, ransom, or destroy organizations’ data are a convincing argument … Continued

Cyber-Protecting the 21st Century Workforce

used with the permission of http://thenetwork.cisco.com by Jason Deign Today’s workers are more mobile, free, and flexible than ever before. That makes them harder to protect from IT threats. Ori Levi apologized as he took the stage at an October 2017 CryptoFriends Netup meeting in Barcelona. He had been up until 6 a.m. the night … Continued

Prolonging Your Smartphone Battery

Is your smartphone battery suddenly being depleted too quickly? Your phone’s age, environment, and installed apps can all affect the battery and its ability to hold a charge. Here are some tips to find out what’s draining your battery and how to remedy it. #1 External Heat Heat does affect smartphone battery performance, and you … Continued

Stick With Security: Require Secure Passwords and Authentication

used with permission from FTC.gov by Thomas B. Pahl, Acting Director, FTC Bureau of Consumer Protection To make it harder for hackers to bluff their way onto a computer network, careful companies follow the advice of Start with Security and require strong authentication practices. We’ve considered FTC settlements, closed investigations, and the questions we get … Continued

Why Bother With Updates and Upgrades?

When was the last time you thought about software updates and hardware upgrades? For many, updating software and hardware is not a priority because “If it ain’t broke, don’t fix it”. However, it’s clear that today’s cyber attacks prey on vulnerabilities present in old software and hardware. (This holds especially true for operating systems such … Continued

Equifax Breach: What should you do to protect yourself?

The big news this past week has been the Equifax breach. On September 7, Equifax — a top credit reporting firm — announced that hackers stole consumer data from mid-May through July 2017, affecting 143 million people. Hackers stole customer names, Social Security numbers, birthdates, and addresses. A smaller set of consumers also had their … Continued

Monthly Business Continuity Tip: Excessive Heat-Silent Killer

Heat can be a silent killer. With heat, you will not see toppled trees, flooded basements, or roofs ripped off of houses like you would with other events. Instead, heat exhaustion can develop suddenly or over a period of time and is caused by the loss of water and electrolytes by sweating. In fact, you … Continued