Employee Security Training

Employee Security Training Human-error; we talk about it all the time, but what exactly do we mean?  Human-error occurs when an individual performs a task or does something with an unintended outcome.  It’s easy to point the finger at employee’s as being an organization’s weakest link, but without appropriate security awareness training provided by the […]

How Does the Dark Web Impact Small to Medium Size Businesses

  How Does the Dark Web Impact Small to Medium Size Businesses Identity theft is an unfortunate occurrence that is all too familiar with most business owners, but do those individuals know where the compromised data will end up?  Often, these business owners are unaware of the virtual marketplace where stolen data is purchased and […]

How Safe Are Your Passwords

Last month we talked about Cyber-Security and how Small and Medium-sized businesses are prime targets to cyber-attacks.  We wanted to follow-up with creative ways on how these attacks are happening.  So, in this segment we wanted to share a little bit about passwords and how important it is to have a great Password Policy.

Cyber-Attacks

  Cyber-Attacks   Small- and medium-sized businesses (SMBs) are the prime targets for cyber-attacks because they tend to be easier targets. They’re often less secure and unprepared for attack. Think about burglars that go after houses where they know no one is home. With more cyber crime automation and the rise of hacking kits, the […]

Alert! Cyber Phone Scams

As technology advances in the industry, many companies are looking for the best competitive edge.  Some companies go above and beyond to provide the greatest service possible to their clients.  Unfortunately, there have been more concerns about scams via phone calls and other sources. We’ve had a number of clients receiving phone calls (sometimes multiple […]

The Cloud – Part 3

In our last two posts, we’ve discussed the basic definitions of cloud services and a few considerations when moving to the cloud.  In our final post of our three-part series, we would like to discuss practical configuration examples we would use  when utilizing “the cloud” for your infrastructure.  (We know, these posts are a little techie/geek-speak… […]