“If it ain’t broke, don’t fix it!” That saying applies in many places, but NOT to computer hardware and software. It’s clear that many of today’s cyber attacks prey on vulnerabilities present in old software and hardware. This is...
Financial losses, data breaches and reputational damage are just some of the ways a cyber-attack can hit an organization hard. The Petya and WannaCry cyber-attacks in May and June 2017 are two of the biggest in history and impacted...
Most small business owners don’t know much about basic computer maintenance and as a result, their PCs slow down or crash. The real issue is neglect: failing to update security patches and antivirus software, overloading the system with trial...
Computer virtualization has been rising in popularity during the past few years due to its ability to provide a viable solution for companies to increase productivity while reducing IT infrastructure costs. By switching to virtualization, companies have been able...
If you’re looking for a competitive IT advantage, maybe it’s time to look at partnering with a managed service provider (MSP). These trusted IT partners work in conjunction with your IT department— freeing them to focus on strategic projects...
Here are six things you should do to help keep your personal information safe and secure. Use a VPN on public networks. You may not know this, but the public wifi hotspots we now find everywhere are not always...
Understanding Maturity Levels To support those who use the staged representation, all Capability Maturity Models(CMM) reflect maturity levels in their design and content. A maturity level consists of related specific and generic practices for a predefined set of process...
A study from the National Institute of Standards and Technology (NIST) found that 63 percent of participants have experienced “security fatigue,” defined as “a weariness or reluctance to deal with computer security.” It’s not that hard to understand. Technology users get tired and...
Who’s ready to fight cybercrime in 2018? Don’t all raise your hands at once. If you’re a CIO or CISO, you’re expected to provide cybersecurity and Protect sensitive data. But given the threat landscape, there’s no such thing...
Healthcare organizations have become very acquainted with the HIPAA Privacy Rule over the last few years. Privacy officer appointments and employee training have become ubiquitous ever since the Omnibus Rule gave HIPAA some real power. The Security Rule, though,...