BLOG

Remote Worker Cyber Security – Phase 2

Remote Worker Cyber Security – Phase 2

So, your company is implementing a hybrid work model where your staff works from home a few days a week.  Or maybe your company is going fully remote and closing the office.  By this time, your company has probably updated their Information Security Policy...

read more
Business Password Management

Business Password Management

With the rapid increase in data breaches and ransomware attacks, proper password and authentication management is vital for companies to protect their local and cloud assets.  But with that importance also comes increased complexity and the need to deal with more...

read more
Ukraine-Russia War Cybersecurity Concerns

Ukraine-Russia War Cybersecurity Concerns

What steps should small businesses take? The Russian invasion of Ukraine is both bad and sad on many levels, and in many ways.  Luckily for us in the United States, other than some inflationary pressures, especially in gas prices, we have largely been unaffected...

read more
The Shift of Workers to Mobile Devices

The Shift of Workers to Mobile Devices

Workers are replacing PCs with Mobile Devices Twenty years ago, if you wanted to access electronic information you really had two choices, PC or Mac.  But today, companies have many more choices – Smart Phones, tablets, Chromebooks, and even Linux desktops. This...

read more
IT vs. Cyber Security vs. Compliance

IT vs. Cyber Security vs. Compliance

Most people who own or run a small business tend to lump IT management, cyber security, and technology compliance all into the same bucket. But the truth is these duties are a combination of highly interrelated and built on top of each other, yet somewhat distinct from each other.

read more
Successful Onboarding/Offboarding with IT Integration

Successful Onboarding/Offboarding with IT Integration

A quality IT firm starts with your business needs and processes, and develops technology planning and implementations around those, rather than the other way around. In that way, they can assure that your IT spend is aligned with your business goals and improving your business productivity and profitability. A clear example of that is getting the HR and operations side of your business and IT in sync on your onboarding/offboarding process…

read more
Is Your Surveillance System Making Your Business Insecure?

Is Your Surveillance System Making Your Business Insecure?

Good surveillance of your critical areas is essential to strong cyber security.  At the least, it can help discourage unwanted behavior.  Should that not be enough, surveillance cameras can provide valuable evidence of wrongdoing.  But implementing surveillance the wrong way can put your cyber security at much higher risk…

read more