Follow us on Twitter! Follow us on LinkedIn Like us on Facebook! Follow us on YouTube! Add us on Google Plus!

Blog

In our monthly newsletter we have a dedicated area set aside for the “Shiny New Gadget of the Month.” Every month we feature something new and cool that solves some sort of problem, big or small, with technology. Many of the items are pocket sized and solve some sort of inconvenience rather than real problem. Yet, far too many business owners feel that the answer to the bigger issues, like IT security, is bigger technology. And that is a clear indication that IT security is not fully understood. The thing to remember about security is that it’s always about people.…
The reality is that every business, regardless of size, is vulnerable. Small and medium sized businesses are actually bigger targets, as compared to larger companies for much the same reason thieves rob convenience stores rather than banks. It’s why criminals go after the smaller accounts rather than the large ones. They want the least amount resistance, the least amount of hurdles. Easy gets are what they are looking for. As a matter of fact, according to the 2012 Verizon Data Breach Report, smaller organizations (less than 1,000 employees) represented the majority of 2012 breach victims. As businesses grow, a gap…
IT security technologies are ever evolving. UTMs are the latest development in security appliances. They are single modular appliances that include multiple critical security technologies that are fully integrated. UTMs have gained popularity because they address the rise in blended threats. Security attacks will often target separate parts of the network simultaneously which can be difficult to successfully protect with different appliances or software for each type of threat. A single point of defense makes validating and removing threats more effective. The advantages to UTMs are plenty. They include lower up-front cost, given that it is generally less expensive to…
It’s not very difficult to tell how well protected your IT network is. Although, the telltale signs can sometimes be so common that they are often simply accepted as the norm. In fact, recent studies find that roughly one in three of the computers in the Unites States are infected in one way or another. Let’s take a moment to take these “norms” and identify them as red flags they are.“I think my computer has a virus” is a common enough phrase, which makes it among the easiest symptom to let slip past. The problem is that those viruses, malware,…
There are things that your employees do on a daily basis that threated the security of your network, but they are by no means doing it maliciously. Much of what they do to threaten the network is actually outside of it, which is why you don’t know about it. Here are the most common things they do on a regular basis that threaten the IT security of your organization.   1.    They don’t maintain their systems.Home systems don’t usually receive the same scrutiny office computers do. While operating systems are updated pretty regularly and automatically, the same cannot be said…
A Business Continuity Plan is put in place to lower or eliminate altogether the downtime that comes after a disruptive event. These can come in many forms including fires, floods, user error, poor infrastructure, malicious activity, hardware defect, and this day and age, even terrorism. All of these can lead to loss of internet and telecom connectivity and even the loss of data.   Regardless of the cause, when a disruptive event occurs, a Business Continuity Plan will bring order to the chaos that will likely ensue in the wake of the event. The plan will provide a clear path…