Entries by CTSI

8 in 18

used with permission from HP Tech@Work 8 business trends for 2018 — and beyond As the calendar rolls over into 2018, we’re looking into the crystal ball at business trends that will shape the upcoming year — and years to come. Community engagement over social media interaction Despite the proliferation of smartphones and connected devices, […]

Tips to Improve Your Cybersecurity in 2018

2018 is upon us so here are our top five tips for things you can do to improve your cybersecurity in the new year. Cybersecurity has been the most critical issue in 2017, and that’s not going to change. If you haven’t begun addressing your organization’s cybersecurity defense, let’s start now! #1 Train Your Employees […]

How ridesharing services can take your privacy for a ride

used with permission from Norton by Symantec In cities around the globe, using ridesharing services has become a way of life. Just as “Google” has become a verb, so have “Uber” and “Lyft,” to name just two of the better-known ridesharing companies. The convenience of always-available cars and drivers paired with easy-to-use apps, plus a […]

Stick with Security: Segment your network and monitor who’s trying to get in and out

used with permission from FTC.gov by Thomas B. Pahl, Acting Director, FTC Bureau of Consumer Protection Who’s coming in and what’s going out? Businesses that want to stick with security build commonsense monitoring into their brick-and-mortar operations. Whether it’s a key card reader at the door or a burglar alarm activated at night, careful companies […]

3 Security Advantages of Managed IT Services

Managed IT services, or outsourced remote network management, can help your business in many ways. It’s a cost effective way of having your IT infrastructure monitored and maintained by experts instead of hiring an IT director. Or, it can free up your IT director and IT staff to work on more important projects than daily […]

When is a Simple Data Backup Not Enough?

You know you need data backup, but when do you need a business continuity solution? If you’ve been paying attention to the news, you’ll know that massive global ransomware attacks are only growing in scale and frequency. These attacks and other threats and accidents that cripple, ransom, or destroy organizations’ data are a convincing argument […]

Cyber-Protecting the 21st Century Workforce

used with the permission of https://thenetwork.cisco.com by Jason Deign Today’s workers are more mobile, free, and flexible than ever before. That makes them harder to protect from IT threats. Ori Levi apologized as he took the stage at an October 2017 CryptoFriends Netup meeting in Barcelona. He had been up until 6 a.m. the night […]

Stick With Security: Require Secure Passwords and Authentication

used with permission from FTC.gov by Thomas B. Pahl, Acting Director, FTC Bureau of Consumer Protection To make it harder for hackers to bluff their way onto a computer network, careful companies follow the advice of Start with Security and require strong authentication practices. We’ve considered FTC settlements, closed investigations, and the questions we get […]

Why Bother With Software Updates and Hardware Upgrades?

When was the last time you thought about software updates and hardware upgrades? For many, updating software and hardware is not a priority because “If it ain’t broke, don’t fix it”. However, it’s clear that today’s cyber attacks prey on vulnerabilities present in old software and hardware. (This holds especially true for operating systems such […]

Equifax Breach: What Should You Do to Protect Yourself?

The big news this past week has been the Equifax breach. On September 7, Equifax — a top credit reporting firm — announced that hackers stole consumer data from mid-May through July 2017, affecting 143 million people. Hackers stole customer names, Social Security numbers, birthdates, and addresses. A smaller set of consumers also had their […]

6 Ways to Exercise in the Office

used with permission from HP Technology at Work You’ve probably already heard that sitting at a desk all day is bad for your health. According to the World Health Organization, physical inactivity is classified as the fourth leading cause of global deaths, causing an estimated 3.2 million deaths worldwide.1 But don’t quit your desk job […]

What Does Your Business Stand to Lose in a Cyber Attack?

used with permission from Microsoft US Small and Midsize Business Blog Not long ago, I blogged here about a new type of cybercrime called ransomware. But when it comes to cyber crooks, apparently they’re also using some old-fashioned methods to breach businesses’ systems. The 2017 Annual Cybersecurity Report from Cisco shows cybercrime is growing. Here’s what could be […]