Blog

What To Look for in a Disaster- Recovery Service Provider

What To Look for in a Disaster- Recovery Service Provider

Disaster recovery isn’t just a technical service. It’s about protecting people, protecting livelihoods, and protecting your ability to serve clients who depend on you. Too many businesses assume that “basic backups” were enough—until they were staring at hours, days, or even weeks of downtime.

read more
Hot Topics at IT Nation Secure 2024

Hot Topics at IT Nation Secure 2024

I'm back from last week's IT Nation Secure conference, and I want to share just a few of my takeaways from the sessions: Hacking is bad and getting worse AI is growing, and companies aren’t prepared Most professional businesses aren’t ready for security regulations...

read more
Supply-chain Vulnerabilities—Mitigation for Manufacturers

Supply-chain Vulnerabilities—Mitigation for Manufacturers

In the intricate supply chains of modern manufacturing, each link in the chain is potentially vulnerable to hackers determined to exploit weak security. So a single cyberattack on any part of the supply chain can wreak havoc on manufacturers’ operations and reputations. By embracing a proactive, collaborative approach to supply chain cybersecurity, manufacturers can risks and gain a valuable competitive edge.

read more
Social Engineering Hacking—Attack Types and Examples

Social Engineering Hacking—Attack Types and Examples

Security tactics such as IT audits, pentesting, vulnerability scanning, reports and alerts are highly sophisticated. Yet, social engineering hacking is able to circumvent this technology by ‘hacking’ our brain instead—taking advantage of our trust, fear, politeness, or inattention. This specific type of hacking may be supported by technology; but the catalyst is psychological exploitation.

read more
What To Do if You Think Your Business Was Hacked

What To Do if You Think Your Business Was Hacked

A data breach is a serious incident that can have far-reaching consequences for businesses and individuals. When a company’s data is breached, it can lead to the theft of sensitive information, such as credit card numbers, Social Security numbers, and medical records. Criminals can then use this information to commit fraud, identity theft, and other crimes.

read more
Cybersecurity Insurance Hacks Out an $80 Billion Niche

Cybersecurity Insurance Hacks Out an $80 Billion Niche

Cybersecurity insurance companies are paying close attention to security researchers, pentesters and even malicious hackers. While government legislation grinds along, insurance terms are tightening while premiums rise. Do you know the impact of your policy’s conditions? Are you compliant and covered —or confused?

read more
Six IT Cost-Saving Strategies for Small and Midsize Businesses

Six IT Cost-Saving Strategies for Small and Midsize Businesses

Small and midsize companies are always looking for ways to save money without jeopardizing their mission and business operations. At the same time, shifts in the market and economic headwinds like inflation, technology advancements, and the threat of recession, bring uncertainty and new challenges that continually “stress test” a company’s workforce, systems, and security.

read more
What is Penetration Testing in Cybersecurity? | Pen Testing

What is Penetration Testing in Cybersecurity? | Pen Testing

What is penetration testing in cybersecurity? This blog post defines pentesting and explains the demand for it. It also sets out various pentesting approaches and what you can expect from pentest reports. Finally, it concludes with a strong business case for its adoption, along with some principles to help you commission or conduct successful pentests.

read more
Supercharging IT Delivery with Artificial Intelligence Technology

Supercharging IT Delivery with Artificial Intelligence Technology

There is an incredible amount of buzz about artificial intelligence at the moment. Everyone seems to be talking about it and many have already jumped in to explore its power and potential benefits. But what does artificial intelligence (AI) mean in real-world terms, and how will it fit within today’s existing technology landscape, particularly for small and medium businesses (SMBs)? In the end, will AI be a powerful enabler, a business risk, or an interesting mix of both?

read more
What is co-managed IT and when is it a good fit?

What is co-managed IT and when is it a good fit?

As businesses grow and the pace of technology accelerates, IT teams can quickly become overwhelmed. How do they keep networks, users, data, and infrastructure safe from sophisticated cyber events and hacks? How do they access specialized talent for large strategic...

read more
Best IT security practices for working from home

Best IT security practices for working from home

I’m one of those fortunate people whose company supports a hybrid work environment. This means that I generally work from home, but can actually work from anywhere (in the office, at home, and on the go). On a typical day, I’m in my home office—where I have access to...

read more
A recipe for IT transformation in lean times

A recipe for IT transformation in lean times

Many experts are predicting an upcoming recession. Slow to develop and even slower to leave, economic downturns pose some interesting challenges for small businesses. How do you reduce expenses while still maintaining valued staff, IT operations, and security? How do...

read more
How Hashtags Can Lead to Being Hacked

How Hashtags Can Lead to Being Hacked

Cybersecurity is a growing concern for many businesses and individuals, and the current statistics related to cybercrime are startling. Consider that in one year, cybercriminals will steal 33 billion records. And in the United States alone, $15 billion is lost every...

read more
Cloud Computing Deployment Models

Cloud Computing Deployment Models

Cloud computing has rapidly grown in popularity, as it provides many business benefits. As cloud computing becomes more popular, it is becoming more important to understand the different types of cloud deployment models available. The best deployment architecture...

read more
Disaster Recovery vs. Business Continuity

Disaster Recovery vs. Business Continuity

It's common in many industries to use the terms disaster recovery and business continuity interchangeably. The confusion likely stems from similarities in planning for a disaster and planning for a disruption that may impact your ability to conduct business. However,...

read more
Upgrading Your Network with Managed IT Services

Upgrading Your Network with Managed IT Services

In a market dominated by technology and innovation, it’s no surprise that many businesses are looking at innovative ways to get more bang for their buck in terms of their technological investments. And there are many ways that you can shift strategies and try...

read more
Cloud Computing in the Healthcare Sector

Cloud Computing in the Healthcare Sector

Cloud computing has grown tremendously in the last several years. And while several sectors held out initially because of more stringent security requirements, many of these security concerns have been addressed. Healthcare information is subject to the Health...

read more
What is Sandboxing?

What is Sandboxing?

Many terms describe specific strategies or tactics related to security practices in digital security. Sandboxing is one of these terms, which describes the isolation of an environment for testing purposes without impacting the overall system. This strategy is critical...

read more
Give Thanks!

Give Thanks!

There are so many things that I am thankful for this year. At the top of that list are our employees and clients. We have all been through so much over the last two years (okay, 22 months), but we have all hung in there together. I am particularly proud of how my...

read more
Should Cloud-Based Data Be Encrypted?

Should Cloud-Based Data Be Encrypted?

Recent years have seen a tremendous increase in the number of cloud-based solutions as part of their managed IT services. Cloud solutions have become integral to many companies by moving back-end infrastructure to a provider's data center. This process removes the...

read more
October is National Cyber Security Month

October is National Cyber Security Month

October is Cyber Security Awareness Month. This month was deemed a collaborative effort between government agencies and industry leaders to bring visibility to the problems with cybercrime. An additional goal of Cyber Security Month is to ensure that all individuals...

read more
Rethinking Cybersecurity

Rethinking Cybersecurity

Why Most Companies Get Hacked, And Some Others Don’t The global pandemic has drastically changed the business landscape. While businesses were in a rush to adapt to keep their doors open, cybersecurity was often just an afterthought, and now we are more vulnerable...

read more