BLOG

IT vs. Cyber Security vs. Compliance

IT vs. Cyber Security vs. Compliance

Most people who own or run a small business tend to lump IT management, cyber security, and technology compliance all into the same bucket. But the truth is these duties are a combination of highly interrelated and built on top of each other, yet somewhat distinct from each other.

read more
Successful Onboarding/Offboarding with IT Integration

Successful Onboarding/Offboarding with IT Integration

A quality IT firm starts with your business needs and processes, and develops technology planning and implementations around those, rather than the other way around. In that way, they can assure that your IT spend is aligned with your business goals and improving your business productivity and profitability. A clear example of that is getting the HR and operations side of your business and IT in sync on your onboarding/offboarding process…

read more
Is Your Surveillance System Making Your Business Insecure?

Is Your Surveillance System Making Your Business Insecure?

Good surveillance of your critical areas is essential to strong cyber security.  At the least, it can help discourage unwanted behavior.  Should that not be enough, surveillance cameras can provide valuable evidence of wrongdoing.  But implementing surveillance the wrong way can put your cyber security at much higher risk…

read more
Cyber Liability Insurance 101

Cyber Liability Insurance 101

The COVID-19 pandemic has impacted everyone in one way or another. If there is one category that most benefited from the pandemic, it’s cybercriminals. That’s why cybercrime has shot up by almost 300% since the start of the pandemic and that’s why you should consider necessary measures to protect your business from malicious cyber players. One of these measures is to have Cyber Liability Insurance….

read more
Zero Trust is the New Network Security Architecture

Zero Trust is the New Network Security Architecture

With the cyberthreat landscape getting more complicated with every passing minute, cybersecurity deserves more attention than ever before. Fully trusting applications, interfaces, networks, devices, traffic and users without authentication is no longer an option. Misjudging and misplacing your trust in a malicious entity can lead to severe breaches that can damage your business. Zero Trust Security practices, however, can go a long way towards helping small and medium-sized businesses (SMBs) minimize cybersecurity risks and prevent data breaches.  Click to learn more…

read more
CMMC: The new security standard for the DoD (and others?)

CMMC: The new security standard for the DoD (and others?)

If you do anything with Department of Defense (DoD) contracts, you are probably already familiar with the new Cybersecurity Maturity Model Certification, or CMMC. By 2026, all new DoD contracts will require all primary and sub-contractors to be CMMC certified. The route to this certification is first through self-certification of National Institute of Standards and Technology standard 800-171. But this requirement may have repercussions far beyond just the DoD contractors.

read more
Cloud PCs.  They’re getting closer….

Cloud PCs. They’re getting closer….

Last August I wrote about the coming of Cloud PCs in Cloud PCs: Get Ready to Subscribe Your Next PC. All the facts and benefits I presented there are still true, maybe even more so now. While it may not be visible to most small businesses and consumers, those of us with our ears on the rails can hear the rumble of the train coming. Already, over 40% of the computing workloads are in the cloud now. While being led by large organizations, the effects, and the benefits, are soon to be seen by everyone. The cloud may have started with servers and storage; but the desktop is being pulled in now too….

read more
IT Systems Management: Stay Current or Stay Old?

IT Systems Management: Stay Current or Stay Old?

There are many good and profitable reasons for a company to keep its IT systems current. But sometimes a firm needs to keep older systems functioning. How such a firm handles this can have a big impact on its cyber security and worker productivity. Here are some strategies that will help companies meet these seeming contradictory needs.

read more