Follow us on Twitter! Follow us on LinkedIn Like us on Facebook! Follow us on YouTube! Add us on Google Plus!

Blog

Having a backup solution in place should be a given at this point. With data being the backbone of your business, all measures must be taken to not only protect it but have a plan for recovery in the event of loss. But with so many different options out there, it can be difficult to decide upon which is the best solution, and the temptation can be to go with the least expensive upfront cost solution, which can often end up being the most costly solution in the end. There are several types of backup strategies that can be implemented,…
Sometimes erratic behavior can be shrugged off for just mere computer glitches and not taken too seriously. But many times they can be signs that your system has been compromised and it is time to get a better IT security in place. Following are the most commons signs that you’ve been hacked. 1. Fake anti-virus pop ups While not as popular as they once were, these are very effective. They appear as pop up messages that simulate a scan of the computer then state that the system was is with viruses. More often than not they would prompt to “clean”…
BYOD, or Bring Your Own Device, is the IT policy where employees are allowed, or even encouraged, to use their personal device to access the corporate network. These devices can include laptops, tablets, and smartphones. The access allowed can vary from full, unlimited access, to limited access with no local storage of data allowed, to limited access to limited data, to access to all data with IT control over the devices. This device generally tends to develop over time as a byproduct of productivity as technologies make network access easier and easier. A BYOD policy brings a few advantages that…
Having poor IT security has a real bottom line cost when data loss eventually happens. Whether it be through an external breach, a system failure or human error, if IT security is not properly in place to protect the data, then the cost of that loss can be rather high. According to the Ponemon Institute 2014 Global Data Breach Study, the United States has the highest cost per-record in the world at $201 in 2013. Meaning, for every record of information lost, client information, employee information or so on, will cost a company an average of $201 per. The per-record…
Not many business owner are aware that New York State has data breach laws known as the "Information Security Breach and Notification Act," or if they are even beholden to them. Unfortunately, ignorance is not a good case for failure to comply and being in violation of this law can cost you tens of thousands of dollars. The law has been in place since 2005 and provides New York State residents with the right to know if their private information has been compromised. This law defines a security breach as an unauthorized acquisition of computerized data which compromises the security,…
In our monthly newsletter we have a dedicated area set aside for the “Shiny New Gadget of the Month.” Every month we feature something new and cool that solves some sort of problem, big or small, with technology. Many of the items are pocket sized and solve some sort of inconvenience rather than real problem. Yet, far too many business owners feel that the answer to the bigger issues, like IT security, is bigger technology. And that is a clear indication that IT security is not fully understood. The thing to remember about security is that it’s always about people.…