Who’s Got Your Back(up) In Case Of Ransomware? Who’s Got Your Back(up) In Case Of Ransomware? Big stories in the news these last two weeks are about ransomware attacks. A school district in New York State and 22 small towns in Texas were the victims of a coordinated ransomware attacks. The New York school district […]
Security: How Can You Know You Have It?
Security: How Can You Know You Have It? Security: How Can You Know You Have It? Security is a big, big issue in these times, and the effort to be secure has become a major daily responsibility. How can you know you are secure? Whether it’s a small gesture like locking your front door when […]
7 Critical IT Advances—Are You There Yet?
7 Critical IT Advances—Are You There Yet? When you outsource your company’s Information Technology, you should expect to bring on a skillful partner dedicated to helping your company succeed. This person is tasked with keeping you apprised of IT budget needs, of industry threat levels, of monthly productivity, and he or she should be in […]
2FA—A Major Tool For Your Security
2FA—A Major Tool For Your Security What I like best about 2FA (2 factor authentication) is that it’s a major security tool I myself can use to help protect my data. Yes, it’s one more step to get into your software and services, but every day brings a new story of a major security breach. […]
Working On The Puzzle of “Fit” With Your Suppliers
Working On The Puzzle of “Fit” With Your Suppliers When you own a business, you spend much of your time working on puzzles. Your ever-changing market can be a puzzle. Maximizing employee productivity can be a puzzle. Staying on the leading edge of your industry can be a puzzle, and sometimes just finding the leading edge of […]
Your Business IT: Friend or Foe?
Your Business IT: Friend or Foe? I am often surprised to learn that business owners aren’t sure if their company computer network is their friend or their worst enemy. When it’s efficiently tracking supply chain transfers, it’s an invention better than learning to use wheels. When booting up in the morning takes 5 minutes, it’s […]
Internet Privacy: What Google Knows
Internet Privacy: What Google Knows What don’t we google these days? I’m using the word as a verb (the action of looking something up) rather than the proper name of a company, with a capital “G”. We google how to fix our plumbing, restaurant reviews, where movies are playing, sports scores. Even if you can’t […]
Malware In A Flash: It’s A Thing
Malware In A Flash: It’s A Thing I don’t often get to discuss a subject ripped from today’s headlines, but malware in a flash drive is a security issue you should be aware of. So here’s a little warning. Recently a Chinese woman talked her way into Mar-A-Lago and was then arrested. On her person […]
Don’t Settle When It’s Your Business Technology
Don’t Settle When It’s Your Business Technology “Don’t settle” is a hot topic for me. Often when I take on a new client, I can be surprised at what I see this business has been using for their IT. It can be obsolete hardware, outdated software, strange network configurations, poor security and data preservation techniques, […]
Encryption Software Will Reinforce Your Cybersecurity
Encryption Software Will Reinforce Your Cybersecurity There are so many ways to hack these days. Choosing the right technology security solutions to safeguard your business against invasions is critical. Without the right protection, such as encryption software, businesses and organizations face a high risk of hackers entering illegally into their systems. They can collect sensitive business […]