cloud computing

Cloud computing has great advantages, but its vulnerabilities can affect even the biggest tech names. When a network of internet of things (IoT) gadgets like routers, DVR machines and closed-circuit TVs can take down hardened, well-provisioned internet giants like Twitter, Spotify and Amazon—as happened October 2016—you’ve got to think twice before moving your data to…

Read More
hurricane planning for your tech

Many businesses were impacted by the hurricanes of recent years. Those that ultimately recovered had one thing in common—they were prepared ahead of time. While we can’t prevent or anticipate all disasters or threats to our businesses, preparation plays a huge role in emerging from of such a situationintact. There are several aspects of your…

Read More
email

No matter how “bomb-proof” we make your network, you and your employees can still invite a hacker in if you click on a link or open an attachment in an email sent by a cybercriminal. While some spam is obvious (can you say, “Viagra at a discount”?), others are very cleverly designed to sneak past…

Read More
electricity

Is your computer plugged in? Do you use a power strip with a surge protector? If so, you are a heartbeat away from disaster and don’t even realize it. Believe it or not, the same electricity you depend on to run your computer and network is also one of the biggest threats to your equipment,…

Read More
man in grey hoodie sitting in darkness on the computer

While it’s impossible to plan for every potential scenario, a little proactive planning and proper network precautions will help you avoid or greatly reduce the impact of the vast majority of cyber identity theft you could experience. Make Sure Your Backups Are Encrypted It just amazes me how many organizations don’t have the security of…

Read More
man in grey suit facing white hologram chart

You’re ready for Hurricane Irma… but how about your business technology? It’s not too late to protect your computers and data from the impending storm. Here are some quick steps you should take NOW to minimize possible downtime due to storm damage. Check your data backup system to make sure it’s working. Do a test…

Read More
man holding lock icon

We’ve heard the stories about electronic protected health information (ePHI) being misused or released to the public. But did you know that mere lack of protection itself can put you in violation of the Health Insurance Portability and Accountability Act (HIPAA)? In 2013, Idaho State University agreed to pay $400,000 to the U.S. Department of…

Read More
ransomware skull key icon

You sit down at your desk, log on to your computer… and are greeted with a brazen message: YOUR COMPUTER AND FILES ARE ENCRYPTED. YOU HAVE 96 HOURS TO SUBMIT PAYMENT OR YOUR FILES WILL BE DESTROYED. You’ve been working on a project for two days. But when you frantically search for your files, they’re…

Read More
blue backup key on computer keyboard

Congratulations – you’ve made the wise choice of backing your data up to a secure off-site facility! But how do you choose the right firm to perform this very important function? If your data is important enough to back it up to a secure off-site facility, you shouldn’t trust that job to just anyone. Here…

Read More