What Can Be Learned from the Most Recent DBIR
Verizon Communications logo on the wall of the server room. Editorial 3D Since 2008, Verizon has released an annual report that details the cybersecurity incident trends from the beginning of the year. As usual, this year’s edition provided some insights into the...
Tip of the Week: Streamlining Your Workstation for Focused Productivity
Productivity is generally included in any company’s list of priorities, and among those, it generally ranks somewhat near the top. With workplaces beginning to open with very different processes than what they are used to, productivity may be a little challenging to...
Cloud Computing Offers Quick Solutions
Most businesses today use cloud computing in one way or another. As people have been working from home, the value of cloud-based platforms has been noticed by new organizations of all types. With some businesses having seen significant cost reduction with their...
Failure is Not an Option: Getting Rid of Single Points of Failure
You might think that your business is going to be OK even if a single device goes down. After all, there are other devices your people can use. It’s not as if the entire system is going to fall like dominoes. Or is it? Get rid of single points of failure to make one...
Are You Due? What to Do When You Get a Renewal Notice
Your business relies on any number of service providers. You’re likely contracting for domain names, website hosting, data backup, software licenses, to name just a few. And that’s only your online presence! So, when a renewal notice comes in, you might just forward...
6 Target Areas to Reduce IT Costs
Your business is always looking to reduce costs. Looking at the information technology budget line items is headache inducing. So much money spent in one area, and there’s so little you can do about it! But is that really true? IT expenses may not be as fixed as you...
How to Destroy Data Properly
We spend a lot of time protecting our data, but what if you need to destroy it? Simply deleting it is not enough as it can be easily recovered. In this article we show you how to property destroy data. Deleting items, or "trashing" them, doesn’t permanently remove...
Island Hopping: Not Always a Good Thing
In this article, we talk about an increasingly popular method of attacking businesses known as "island hopping". It takes advantage of the trust you give to people and businesses you have worked with before. The phrase “island hopping” conjures up positive images. You...
Handle with Care: Sending Data Securely
We are sending more data via the internet than ever before. But have you thought about how secure your data transmissions are? In this article we talk about how to send data securely. In our digital economy, we send and receive information quickly online. The Internet...
Locking Up Cybersecurity with a Managed Services Provider
Cybercrime is not the most costly of illegal activities. That dubious distinction goes to government corruption, followed by drug trafficking. Cybercrime comes in third. Yet cybercrime does take the top spot when it comes to numbers of victims. A managed services...