BLOG
Changing Face of IT Support
Author’s Note: I write my own blogs. That’s unusual. Blogs are often authored by a service and then reposted, especially in IT, or...
Best Remote Access – VPN, ZTNA or SASE?
Until just recently, there was really just one secure remote access method – Virtual Private Network, or VPN. But in the last few...
Global IT Meltdown – More to Come
We have seen the public impact of the recent global IT meltdown – days of cancelled/delayed flights, 911 systems that were down, and other...
Physical Security in the Cyber Era
We all have gone into a high security building and saw those large cameras pointing down at us. In those same buildings, we’ve seen doors...
Say Goodbye to Passwords
Well, maybe not yet, but it’s definitely moving in that direction. The basic tenant of current security is that you authenticate...
IT Budgeting
Being August, it’s time again to think about budgeting for the next year. For most businesses, IT may just be a one- or two-line item on the budget. But that can lead to IT actuals being substantially off budgets. This isn’t because of bad management, but due to the changing nature of IT,, especially if all its various aspects aren’t considered.
In this article, I’ll review our recommended budgeting approach.….
Remote Worker Cyber Security – Phase 2
So, your company is implementing a hybrid work model where your staff works from home a few days a week. Or maybe your company is...
Business Password Management
With the rapid increase in data breaches and ransomware attacks, proper password and authentication management is vital for companies to...
CMMC 2.0: The Updated Security Standard for the DoD (and others?)
In May of last year, I wrote about the forthcoming Cybersecurity Maturity Model Certification, or CMMC, regulations for DoD contractors...
Ukraine-Russia War Cybersecurity Concerns
What steps should small businesses take? The Russian invasion of Ukraine is both bad and sad on many levels, and in many ways. ...