If you’re using any kind of cloud application or storage outside of your office, you are right to be concerned about data privacy and security. As a rule, if you have data worth protecting, you should be concerned about it, regardless of where it is stored. However, many data breaches, including data stored in the cloud, are due to USER ERROR. Therefore, it’s important that you, the user, maintain a strong awareness and culture of security.
WELCOME TO OUR BLOG
No matter how diligent you are about security, nobody is immune to cyber-attacks completely. Security is made to reduce risks and mitigate the impacts of cyber-attacks, but there isn’t anything we can do to completely eliminate the threat. So what do you do in the event that you or your organization becomes a victim?
Your Firewall is USELESS Unless...
- July 16, 2018
- Ben Schmerler
A firewall is a device that sits on the perimeter of your network, allowing (hopefully) good traffic in and blocking bad traffic. EVERY business and individual concerned with keeping bad guys out needs one.
Use STRONG passwords!
- July 9, 2018
- Ben Schmerler
Thanks to powerful password-cracking software that is readily available online, hackers can guess a five-character password in under three hours. If you only use lowercase letters, it’s 11.9 seconds.
If you plan on catching up on some work from home AND you’re using a personal device such as a smartphone or personal laptop – DON’T! Unless your personal device is covered under your organization’s IT support plan and tools, your device could be the one used to introduce a significant cyber-attack or data breach of your organization’s technology.
SUBSCRIBE
CATEGORIES
- Compliance (58)
- IT Security (58)
- Cloud Computing (10)
- Cloud Business Services (7)
- Managed IT Services (7)
- Best Practices (5)
- Disaster Recovery (3)
- HIPAA (3)
- Healthcare (3)
- Managed Services (3)
- Risk Management (3)
- HR (2)
- Human Resources (2)
- Cloud IT Business Services Healthcare (1)
- Data Protection (1)
- Email (1)
- Emergency Preparedness (1)
- IT (1)
- Managed Hosting (1)
- Maryland (1)
- Mobile Computing (1)
- Mobility (1)
- VDI (1)
- Virtualization (1)
- mobile device management (1)
ARCHIVE
- May 2018 (6)
- November 2018 (6)
- December 2018 (6)
- September 2016 (5)
- July 2018 (5)
- August 2018 (5)
- April 2018 (4)
- June 2018 (4)
- September 2018 (4)
- January 2019 (4)
- February 2019 (4)
- January 2016 (3)
- October 2016 (3)
- November 2016 (3)
- October 2018 (3)
- October 2013 (2)
- February 2016 (2)
- May 2012 (1)
- May 2013 (1)
- September 2013 (1)
- February 2014 (1)
- May 2014 (1)
- September 2014 (1)
- December 2014 (1)
- June 2015 (1)
- November 2015 (1)
- April 2016 (1)
- May 2016 (1)
- June 2016 (1)
- July 2016 (1)
- August 2016 (1)
- January 2017 (1)
- March 2017 (1)
- April 2017 (1)
- May 2017 (1)
- June 2017 (1)
- July 2017 (1)
- September 2017 (1)
- October 2017 (1)
- November 2017 (1)
- December 2017 (1)