Blog

Simplify and Separate Your Network

These days, more and more businesses are doing more and more things on the internet. Phones, video surveillance cameras, and other devices have become almost as popular as the computers sitting on every employee’s desk. But if you have all of these devices all sharing the same internal network, you might be endangering your ability to conduct business, your online security and the physical security of your entire facility.

Should You Move To The Cloud?

Is your business growing? That’s great news! But often business growth comes with its own set of challenges. You might need bigger offices, new desks and…new technology. But if you think back to when you last bought servers for your business (and everything that went with it), you might remember that it was a very expensive investment.

Are You Prepared For Business Continuity

What would you do if you lost $145 million? File for bankruptcy is a likely answer. Here’s a better question: What would you do to prevent losing $145 million? The answer to that second question is apparently “nothing” for a Canadian cryptocurrency exchange called QuadrigaCX. They recently filed for bankruptcy because their company founder and CEO passed away while on a business trip, and he was the only person who had the encryption keys for $145 million in cryptocurrency that his exchange was holding for its clients.

The Death of the Mac Malware Myth

Do you have Mac computers in your office? A lot of companies use them because there’s been a myth for a long time that Macs were more secure than PCs. “There’s no malware for Macs,” the old saying goes. And while that used to be true, it’s far less true these days.

The New Era of Cyber Security

Protecting your computer networks and your data is getting more and more difficult. Cyber criminals are getting more sophisticated, and the attacks that they create are more creative than ever. If they can’t install a trojan-infected file on your computer, they create a file-less attack.

Do You Need a HIPAA Assessment?

 

If you’re in the healthcare industry, you probably have heard of HIPAA, the Health Insurance Portability And Accountability Act. And if your business falls under any of the classifications that is covered by HIPAA, you might have heard of a HIPAA Assessment.

Why Full Disk Encryption Isn’t Enough

Many of our clients tell us that they believe their data is secure because they have “full disk encryption” -- typically the BitLocker that comes with Windows 10 -- enabled on their computers. But it’s very important for you to know what full disk encryption is, what threats it can protect you from, and what threats it is defenseless against.

Fileless and Zero-Day Attacks

Many computer users think that if they have a good Anti-Virus program running on their computer, that their computers will be safe from hacks and threats. IT security professionals have long known that is not the case, but now two newer types of attacks are proving it more often than ever.