April 26, 2018
Do You Control Your Mission Critical Data?
Cloud computing has caused a massive shift in how many companies do business; in some ways the shift is comparable to the introduction of the Internet itself. A big part of cloud computing is moving servers, raw data, application data, or business processes to the cloud.
December 5, 2017
TekTalk: Cyber Security
CEO and Founder Robert Hood reviews the three segments to optimal security implementation: Defense, Monitoring, and Response. No matter the size, industry, or budget, Robert shares essential insight on how to protect your business.
October 24, 2017
Is there a Cyber Ninja after you?
It is important to consider two key points when discussing security for your information systems: security is a process, not a destination, and you can never be 100% secure. Security is a continual process of review, plan, implement, monitor, and repeat.
September 26, 2017
Two Factors of Proper Data Management
IT service providers have two key roles when it comes to ongoing operations, Data Protection and Data Security. While they sound like one in the same, these two responsibilites are very different.
July 28, 2017
Our Emails are Certified Safe.
No one is immune from receiving phishing emails, even we receive dozens per week. Often, they seem to come from a known email address (they’re not – the From: address is forged). With spear phishing, the email message is specifically written for you so that it seems familiar enough to trick you into trusting the content.