HELPFUL ARTICLES

NIST – Protecting What’s Most Important

August 27, 2020

By James Laszko The National Institute of Standards and Technology (NIST) created the Cybersecurity Framework (CSF) to give businesses foundational structure and common language to address their own individual security needs. In our previous article NIST – Achieving Alignment in Cybersecurity we established that some form of cybersecurity posture is necessary to simply do business…

Read More

NIST Cybersecurity and Your Agency

August 18, 2020

Every business is a technology business.  Every executive, manager and staff member needs to have a sense of data governance.  Data is the thread that holds your business together.   With that in mind, what will you do tomorrow that you would not have done today? In the following presentation, James Laszko will discuss the…

Read More

NIST – Identifying What You Need to Protect

July 28, 2020

By James Laszko In my previous article NIST – Achieving Alignment in Cybersecurity we discussed how the National Institute of Standards and Technology (NIST) created the Cybersecurity Framework (CSF) to give businesses foundational structure and common language to address their own individual security needs. We established that some form of cybersecurity posture is necessary to…

Read More

NIST – Achieving Alignment in Cybersecurity

June 24, 2020

Technology has always been a dynamic market. Traditional focus has moved from a hardware/software to virtualization and the cloud but data has clearly been designated as the true prize and in the unpatrolled world of the Internet, it is up to you to secure it. You can have the fastest car in the lot but…

Read More

Mitigate Costly New Technology Risks for Continued Stability and Profitability

September 24, 2017

Partnering with a managed service provider (MSP) is one new approach being used by many companies like yours. Experienced MSPs have access to newer tools that reduce costs by automating many routine in-house labor intensive processes. Break-fix is labor intensive, and labor is one of the most expensive operating costs within your IT infrastructure. The…

Read More

Disaster Recovery Plans: Do You Have One?

September 9, 2017

Disaster Recovery Plans: Do You Have One? Disaster recovery and business continuity plans are issues that almost all small businesses fail to think about. More frequently, they decide they haven’t the resources to address such “unthinkables.” If your business was down for 1-2 days or more, what costs would you incur? Lost revenues and lost…

Read More

Is your Business Safe from Virtual Threats?

August 25, 2017

Did you know that 50% of small business owners think their businesses are too small to be targeted by the thieves of the virtual world? Contrary to popular belief, 72% of hacker attacks often happen to smaller firms – firms with less than 100 employees! So how prepared is your SMB? Here’s a checklist to…

Read More

Social Engineering: More than Just Phishing

August 14, 2017

by Stefani Laszko You are probably tired of reading about email security with constant chatter about phishing attacks. I get it, I’ve written 3 other articles on the topic. This month I’d like to go a step further and discuss other ways that criminals gain you or your client’s information through different types of social…

Read More

Why Small Businesses Shouldn’t Avoid Making Disaster Recovery Plans.

August 10, 2017

Why Small Businesses Shouldn’t Avoid Making Disaster Recovery Plans. Entrepreneurs and small businesses, especially ones that are fairly new, often don’t think about making plans to recover in case of a disaster. However, it is the smallest business that most likely has the fewest resources to fall back on in case of disaster. Why does…

Read More

Is That Email a Phishing Scheme?

July 26, 2017

Research has revealed that over half of all users end up opening fraudulent emails and often even fall for them. Phishing is done with the aim of gathering personal information about you, generally related to your finances. The most common reason for the large number of people falling for fraudulent emails is that the phishing…

Read More

WE LOOK FORWARD TO HEARING FROM YOU!

Need more info?  Ready to get started?