Business Continuity
NIST – Protecting What’s Most Important
By James Laszko The National Institute of Standards and Technology (NIST) created the Cybersecurity Framework (CSF) to give businesses foundational structure and common language to address their own individual security needs. In our previous article NIST – Achieving Alignment in Cybersecurity we established that some form of cybersecurity posture is necessary to simply do business…
Read MoreNIST – Identifying What You Need to Protect
By James Laszko In my previous article NIST – Achieving Alignment in Cybersecurity we discussed how the National Institute of Standards and Technology (NIST) created the Cybersecurity Framework (CSF) to give businesses foundational structure and common language to address their own individual security needs. We established that some form of cybersecurity posture is necessary to…
Read MoreWhat’s Your Backup Plan?
You’ve made sure your car, house and business is protected with appropriate insurance but what have you done to protect the data on your computer? These days, replacing a computer is quick and relatively low cost but what would you do without the information stored on it? Ask anyone that has had a data loss…
Read MoreGet your employees excited about IT Training
Get your employees excited about IT Training by Tristan Collopy Savvy business owners know that their employees can be their greatest strength and greatest weakness when it comes to information security. The difference between having employees that are security assets and security vulnerabilities comes down to one thing: training. Below, we’ll go over four ways…
Read MoreHow reliable is your backup?
If you are still reading this after reading my title, thank you — though I am sure you’re thinking why is there another article on backup, right? Though this topic has already been covered we are still finding companies not protected. In the last 3 months we have had 2 new customers come to us…
Read MorePatch right and keep hackers out
used with permission from HP Technology at Work In the arms race between network administrators and hackers, battles are fought over the security holes in enterprise software. Your best defence is the patches that vendors release to plug those holes. Vendors are working to make patching easier and more trustworthy – like Microsoft and its…
Read More7 Ways to Protect Your Small Business from Fraud and Cybercrime
used with permission from SBA.gov by Caron Beesley How secure are your small business assets from fraud, identity theft and cybercrime? According to the Association of Certified Fraud Examiners (ACFE), companies with less than 100 employees lose approximately $155,000 as a result of fraud each year. Small businesses also have a higher fraud rate than…
Read MoreOnline Fraud and Identity Theft
used with permission from Norton by Symantec Online fraud is a type of cybercrime that uses email, web sites, chat rooms or message boards. There are many different types of online fraud, including phishing and pharming scams, which use forged e-mails and Web sites to trick recipients into giving out personal information such as credit…
Read MoreProtecting Your Phone and Tablet from Loss, Theft and Attacks
used with permission from Norton by Symantec Our phones are not just phones anymore. That ‘phone’ that you use to stay in touch with people is actually a little computer (let’s call it a ‘mobile device’) containing valuable information about you, your family, your friends, and your life. Can you imagine losing your mobile device? …
Read MoreGet smart about security
used with permission from HP Technology at Work Congratulations, you’ve taken every step to secure data on your networks and PCs against increasingly malicious worms, Trojans and viruses. But don’t rest easy. All infrastructure elements, including printers, servers, storage, Wi-Fi networks and cloud computing are just as susceptible to surprising security threats. Forget them and…
Read More