BLOG

Zero Trust is the New Network Security Architecture

Zero Trust is the New Network Security Architecture

With the cyberthreat landscape getting more complicated with every passing minute, cybersecurity deserves more attention than ever before. Fully trusting applications, interfaces, networks, devices, traffic and users without authentication is no longer an option. Misjudging and misplacing your trust in a malicious entity can lead to severe breaches that can damage your business. Zero Trust Security practices, however, can go a long way towards helping small and medium-sized businesses (SMBs) minimize cybersecurity risks and prevent data breaches.  Click to learn more…

read more
CMMC: The new security standard for the DoD (and others?)

CMMC: The new security standard for the DoD (and others?)

If you do anything with Department of Defense (DoD) contracts, you are probably already familiar with the new Cybersecurity Maturity Model Certification, or CMMC. By 2026, all new DoD contracts will require all primary and sub-contractors to be CMMC certified. The route to this certification is first through self-certification of National Institute of Standards and Technology standard 800-171. But this requirement may have repercussions far beyond just the DoD contractors.

read more
Cloud PCs.  They’re getting closer….

Cloud PCs. They’re getting closer….

Last August I wrote about the coming of Cloud PCs in Cloud PCs: Get Ready to Subscribe Your Next PC. All the facts and benefits I presented there are still true, maybe even more so now. While it may not be visible to most small businesses and consumers, those of us with our ears on the rails can hear the rumble of the train coming. Already, over 40% of the computing workloads are in the cloud now. While being led by large organizations, the effects, and the benefits, are soon to be seen by everyone. The cloud may have started with servers and storage; but the desktop is being pulled in now too….

read more
IT Systems Management: Stay Current or Stay Old?

IT Systems Management: Stay Current or Stay Old?

There are many good and profitable reasons for a company to keep its IT systems current. But sometimes a firm needs to keep older systems functioning. How such a firm handles this can have a big impact on its cyber security and worker productivity. Here are some strategies that will help companies meet these seeming contradictory needs.

read more
Solid Cybersecurity? Don’t Forget Physical Security!

Solid Cybersecurity? Don’t Forget Physical Security!

The good thing about physical security is it’s easy! At least much easier than cybersecurity. Just follow these simple tips, which we’ve organized from the most obvious to most obscure, and assure your highly fortified virtual perimeter isn’t circumvented with the push of a door.

read more
Recent Security Breach and Small Business Implications

Recent Security Breach and Small Business Implications

You’ve probably heard about the recent massive network security breach that affected many governmental organizations (e.g. Unclassified Pentagon Network, Department of Homeland Security, State Department, Department of Energy, National Nuclear Security Administration, Treasury Department), as well as many of the Fortune 500 companies (e.g. Microsoft, Cisco, Intel, and Deloitte). But there are lessons here for small businesses too.

read more
Artificial Intelligence for Small Business

Artificial Intelligence for Small Business

Artificial Intelligence (AI) is finally making a real impact on businesses. While most of these benefits have gone to large businesses, applications are now becoming available for small business as well. Here are a few that are already available or will be right around the corner….

read more
Password Management in the Cloud Age

Password Management in the Cloud Age

If you can remember back to the days of computers before the internet, you probably only had 1 or 2 passwords. But with the explosion of cloud services, the number of passwords has exploded as well. Today, the average person is probably well over 2 dozen passwords. To deal with all these issues a whole new generation of cloud-based password management systems have sprung up. With these, you just type in one password, and it automatically logs into other sites….

read more
SpotLink named a 2020 BBB Torch Awards for Ethics Finalist

SpotLink named a 2020 BBB Torch Awards for Ethics Finalist

All of us at SpotLink are both honored and thrilled to be named a 2020 BBB Torch Awards for Ethics Finalist. We pledge to all our clients that we will continue to provide honest and fair services, delivered with integrity and professionalism.

The winners will be named October 28th. Wish us luck!

read more