Network Security – Not for the Faint of Heart

Is IT Security on your network doing its job? Earlier this week our IT Services team released an alert to our customers about a frightening new malware on the loose – a Trojan Cryptolock called Trojan:Win32/Crilock.A. This nasty infection will lock you out of your PC and encrypt the data on your network - not just your PC, but mapped drives as well.

Control-Alt-Delete This!

I never imagined that a Microsoft-Harvard forum would be the place to shatter the foundation upon which my IT life has been built, but that is what happened last week (http://www.youtube.com/watch?v=cBHJ-8Bch4E&feature=youtu.be).

During the hour long interview, Gates discussed a variety of interesting topics (relationship with Apple, whether or not IBM made a mistake not buying the MS DOS), but by far the most earth shattering starts at about 16:50. “So we could have had a single button, but the guy that wanted to do the IBM keyboard design didn’t want to give us our single button, and so we programmed at a low level.

BYOD Security Risk – Your Confidential Data on Your Employee’s Devices

If you've got users who BYOD, you've got a security risks. BYOD Security is a critical issue that is too often ignored by business owners and management. Once your employees can access your confidential data on their device, you can toss confidentiality out the door! If you are a business owner, you may want to sit down before you check out the article linked below ("Confidential Data Is Leaving on Workers' Mobile Devices - http://www.

Your data is not secure – negligence and glitches create 64% of breaches

It turns out that despite what you think, your critical corporate data is most likely not very secure. Negligence and glitches create 64% of data breaches - More than a third of intrusions are pegged to malicious attacks in Ponemon/Symantec report.

A recent study from Symantec and The Ponemon Institute revealed that even though the big Cyber Attacks get all the headlines, the reality is that the a significant number of data thefts are the result of employee negligence or system glitches.

Control IT costs and improve efficiency

Yes, you can control your IT costs and still maintain the required level of IT efficiency.
If you watch the stock market, you might think that business is picking up and the outlook is rosy. The reality is that while some purse strings may be loosening, the impact of the Sequester is not yet known and we are not out of the woods yet from the Great Recession.

BYOD Management – Employee Devices + Corporate data = Big Risk?

One question we are getting lately from many customers lately is how to manage the influx of employees' devices that can connect to the corporate network. We call this phenomenon BYOD, or Bring Your Own Device. The device can be a smartphone such as an iPhone or Android, a tablet like the iPad, or even a home PC or laptop.

Outsourcing IT services – Do IT Right!

Outsourcing your IT services - IT Done Right

This can be a daunting and scary task. Your IT Support team is an integral part of your business, and IT has access to all your company's sensitive and private information.

Selecting a new IT Partner has many challenges but it’s important to remember that it’s not just about the technology.