Worth Reading

What Is Cybersecurity?

December 14th, 2018 by admin

What Is Cybersecurity?

Cybersecurity is the practice of protecting systems, networks, and programs from attacks; typically referred to as “cyberattacks.” The goal of a cyberattack is usually to access, remove or destroy sensitive information, extort money, or interrupt...

Read Full Story »

Posted in: Business Advice, Cyber Security, Managed Services

How to Evaluate a Managed Security Service Provider (MSSP)

November 19th, 2018 by admin

How to Evaluate a Managed Security Service Provider (MSSP)

Hiring a managed security service provider (MSSP) to manage your cybersecurity (sometimes also called Security-as-a-Service or SaaS) is a sound business move for organizations that have: limited IT resources, lack internal security expertise, struggle...

Read Full Story »

Posted in: Security, Cyber Security, Managed Services

Talking to Management about Better Cybersecurity

October 26th, 2018 by admin

Talking to Management about Better Cybersecurity

News of cyberattacks continue to dominate the headlines; and there’s no reprieve in sight. Despite this fact, many IT professionals still struggle to get their message across during conversations with non-technical company leaders at the executive...

Read Full Story »

Posted in: Cyber Security, Business Tools, Small Businesses

The Value of Cyber Risk Assessments

September 20th, 2018 by admin

The Value of Cyber Risk Assessments

The key to effectively minimizing cybersecurity threats and their impact on your organization is achieving and maintaining the right security level. For most small to mid-size organizations, figuring out what the right security level actually is, can...

Read Full Story »

Posted in: Business Advice, Cyber Security, Business Tools

What Are Managed Security Services?

August 16th, 2018 by admin

What Are Managed Security Services?

For Small and Mid-Sized Organizations Implementing a managed security program can provide your organization with a variety of benefits, but the primary advantage is to transfer the management and expense of an in-house cybersecurity team to a third-party...

Read Full Story »

Posted in: Security, Cyber Security, Managed Services, Small Businesses

What is SIEM, and How Does It Improve Security?

July 12th, 2018 by admin

What is SIEM, and How Does It Improve Security?

I recently came across a PowerPoint presentation entitled, “SIEM for Beginners: Everything You Wanted to Know, But Were Afraid to Ask.*” I want to share it here (in a re-formatted version), because it’s one of the best explanations...

Read Full Story »

Posted in: Security, Cyber Security, Managed Services

Why systems patching matters

June 12th, 2018 by admin

Why systems patching matters

Patch management is the process for identifying, acquiring, installing, and verifying patches for products and systems. Patches correct security and functionality problems in operating systems, application software and firmware. Although patches can...

Read Full Story »

Posted in: Cyber Security, Managed Services, Business Tools

Cyber Insurance: Worth the Price?

May 10th, 2018 by admin

Cyber Insurance: Worth the Price?

Unless you’ve been living under a rock somewhere, it’s hard to miss the almost daily stream of media reports about cyberattacks and data breaches. Government agencies, healthcare providers, financial institutions, corporations, and, yes,...

Read Full Story »

Posted in: Business Advice, Cyber Security, Business Tools, Small Businesses

What Is a Cyber Attack?

April 28th, 2018 by admin

What Is a Cyber Attack?

Today, security is everyone’s job—from consumers, to system administrators, to executives. If you’re doing business, you need to elevate the priority of security across your organization. Over the years, cybercriminals have gotten a...

Read Full Story »

Posted in: Security, Cyber Security, Managed Services, Small Businesses

Strategies and Tips to Help Protect Your Personal Data

April 3rd, 2018 by admin

Strategies and Tips to Help Protect Your Personal Data

When you shop online, watch YouTube, post on social media, and check your email, keep this one important thing in mind: when you don’t pay with cash, you pay with your personal information. A quote posted back in 2010 by an unhappy MetaFilter user...

Read Full Story »

Posted in: Business Advice, Cyber Security

Why Cybercriminals Love Small Businesses

March 22nd, 2018 by admin

Why Cybercriminals Love Small Businesses

Small businesses are in the crosshairs of an increasingly complex and sophisticated array of cybersecurity threats. Although major hacks of large corporations are now regularly headlining the news, small businesses are actually being attacked more regularly...

Read Full Story »

Posted in: Business Advice, Cyber Security, Small Businesses

Multi-Factor Authentication (MFA) Reduces Risk of Account Compromise

March 6th, 2018 by admin

Multi-Factor Authentication (MFA) Reduces Risk of Account Compromise

Authentication is the process of confirming that an individual is who he or she claims to be. It can involve providing information - like a username and password. Users can authenticate with an ATM card and PIN, a device that can generate or receive...

Read Full Story »

Posted in: Security, Business Advice

Reducing IT Threats with Security Awareness

February 21st, 2018 by admin

Reducing IT Threats with Security Awareness

As good as many of our IT solutions have become at thwarting security threats, some incidents can’t be 100% prevented by the technology. The threats from social engineering are one of them. Within the realm of IT security, social engineering is...

Read Full Story »

Posted in: Business Advice, Cyber Security, IT Support

Tips for Creating an Acceptable Use Policy

February 7th, 2018 by admin

Tips for Creating an Acceptable Use Policy

Organizations of all sizes need to worry about what their employees are doing with company computer equipment and internet connections. It's no longer just a matter of the cost of extra network bandwidth or tracking wasted time that should be spent...

Read Full Story »

Posted in: Compliance, Security, Business Advice, Cyber Security

The Case for Building a Cyber Incident Response Plan

January 26th, 2018 by admin

The Case for Building a Cyber Incident Response Plan

A strong defense is critical to fighting the battle against cybercrime. But having a plan to deal with a cyber incident - should one occur - is equally as important. Why? Because when it comes to preventing a cyber-attack, there is no such thing as guaranteed...

Read Full Story »

Posted in: Business Advice, Cyber Security

Why Being Compliant Is Not the Same as Being Secure

January 15th, 2018 by admin

Why Being Compliant Is Not the Same as Being Secure

There is a dangerous misperception that often comes up, regardless of which regulatory standard we talk about (PCI, HIPAA, etc.).  The misperception is that compliance equals security. Sometimes organizations think they’re the same thing;...

Read Full Story »

Posted in: Compliance, Cyber Security