by Stephanie Rosenzweig | Jul 1, 2019 | Compliance, Cyber Security
What is Endpoint Protection? Endpoints are vulnerable access points for cyber criminals to enter your network. Once inside, hackers can take control of the device to execute a DoS attack, steal high-value information or hold it for ransom. Traditionally, antivirus has...
by Stephanie Rosenzweig | Jun 17, 2019 | Compliance, Cyber Security, News, System Patching & Maintenance
US officials and Microsoft executives have released an advisory that highlights a known flaw in versions of the Windows OS. “All customers on affected operating systems [Windows 7 and earlier] should update as soon as possible,” said Microsoft. A flaw...
by Stephanie Rosenzweig | Feb 27, 2019 | Best Practices, Compliance, Cyber Security, Mobilization
Implement a mobile device policy. This is particularly important if your employees are using their own personal devices to access company e-mail and data. If that employee leaves, are you allowed to erase company data from their phone? If their phone is lost or...
by Stephanie Rosenzweig | Feb 20, 2019 | Best Practices, Compliance, Cyber Security
Here’s a growing trend creeping into organizations of all industries and sizes: Shadow IT. Shadow IT are unauthorized cloud applications employees are using and downloading to perform work-related activities with company data. This can be file-sharing services like...
by Stephanie Rosenzweig | Jan 22, 2019 | Best Practices, Compliance, Cyber Security
Small and mid-sized businesses are being increasingly targeted by hackers. Their data is being exploited, held ransom, sold and corrupted. This kind of disaster can crush the public faith in your business, result in expensive fines, and even shutter your business for...
by Stephanie Rosenzweig | Jan 15, 2019 | Backup Disaster Recovery BDR Services, Best Practices, Compliance, Disaster Recovery Solutions
Effective business technology consists of hardware, software, data and connectivity. Without any one component of this “system,” the system may not function, meaning lost time, energy and dollars! To avoid this, recovery strategies should be developed to anticipate...