7 bizarre security analogies about preventing ransomware hacks

used with permission from Tektonika (HP) by Jasmine W. Gordon Ransomware is the worst. Attacks grew 250 percent last year, and 26.2 percent of those targets were businesses. Even worse, one in six businesses that paid the ransom still didn’t get their data back. WannaCry alone affected over 400,000 machines, and let’s not even get … Continued

Fight breach fatigue: Protect your network endpoints today

used with permission from Tektonika (HP) by Jasmine W. Gordon With headlines rolling in almost daily about massive security breaches and threats on your network endpoints, IT security professionals are becoming desensitized to cyber risks. Last year saw a year-over-year growth in reported breaches of nearly 20 percent, hitting a record of over 5,200 incidents … Continued

Monthly Business Continuity Tip: Non-Technical Security Tips for the Office

You don’t need to be a tech expert in order to master security practices to keep your sensitive data safe. Here are three quick tips for improving security in your office. 1. Keep a clean desktop. At the end of every day, organize your desk, remove unnecessary papers and items, and lock documents with sensitive information … Continued

Three trends transforming the modern workplace

used with permission from Microsoft in Business Blog Advances in technology and shifting workforce demographics are creating a more fluid work environment, redefining what productivity looks like, and empowering individuals to work smarter. With an influx of new talent that values experiences, continued learning, and collaboration over financial compensation, leadership will have to take a … Continued

Tailor your digital security strategy for different departments

used with permission from Tektonika (HP) There are certain digital security principles—like creating strong passwords—universally applicable to everyone in the office, whether you’re an intern or an executive. But just as each department fulfills a distinct role in a business, they also require a distinct set of cybersecurity priorities and best practices. To stay ahead … Continued

Computer Transition Services, Inc. Ranked Among Top 501 Global Managed Service Providers by Channel Futures

  11th Annual MSP 501 Identifies World’s Most Forward-Thinking MSPs & Leading Trends in Managed Services   JULY 11TH, 2018: Computer Transition Services, Inc. ranks among the world’s 501 most strategic and innovative managed service providers (MSPs), according to Channel Futures 11th-annual MSP 501 Worldwide Company Rankings. The MSP 501 is the first, largest and … Continued

4 ways to be good to your PC

used with permission from HP Tech@Work Here’s how to keep it in top shape Let’s be real: You probably can’t swap your PC in for a new one as often as you’d like. A PC is an investment—and taking good care of it pays off in the long run. If your PC has a few … Continued

Build your security immunity with an IT infrastructure checkup

used with permission from Tektonika (HP) by Joe Hewitson As a species, humans have a natural tendency to overcomplicate things. Take coffee, for example: It’s gone from simple, “good ’til the last drop” black coffee to iced, half-caff, ristretto, venti, four-pump, sugar-free, cinnamon, skinny latte. You’d be hard-pressed to buy a car without a full-blown … Continued

Stick with Security: Secure paper, physical media, and devices

used with permission from FTC.gov by Thomas B. Pahl, Acting Director, FTC Bureau of Consumer Protection High-profile hackers grab the headlines. But some data thieves prefer old school methods — rifling through file cabinets, pinching paperwork, and pilfering devices like smartphones and flash drives. As your business bolsters the security of your network, don’t let … Continued

Revamp the way your office works with innovative technology

used with permission from Tektonika (HP) by Lydia Dishman You’ve probably heard that every business is a tech business, but have you ever thought about how the innovative technology you use on a daily basis has impacted today’s workplace culture? Consider how talking on the phone has been almost entirely replaced by text and email … Continued