802.11ax, The New Standard in Wi-Fi

In All by Alex Kallimanis

It seems like every year tech companies are promising a revolutionary new product that will change the shape of business. It also seems like every year that these promises do …

Business Trade Shows Part II: During the Event

In All by Mike Abbott

    We’re back. In the last post, we talked about building momentum toward a trade show exhibition. Today, let’s look at your efforts during the show itself.You already should …

Advanced Security Policy

In All by Alex Kallimanis

On top of the general protections that are outlined in our Core Information Security Program there are a number of a la carte policies that may be required based on …

Business Trade Shows Part I: Before the Event

In All by Mike Abbott

​    Going to a tradeshow for the first time? Don’t make the mistake of viewing this as a 1-2 day discreet marketing event. Instead, view your exhibit at a …

Is Your Website Mobile Optimized?

In All by Mike Abbott

    Smaller firms often struggle just to keep up with maintaining a website. Worrying about a scaled­ down version for mobile users seems like just too much trouble. Today’s …

Password Basics That Are Still Ignored

In All by Mike Abbott

    You can have all the locks on your data center and have all the network security available, but nothing will keep your data safe if your employees are …

Written Policies

In All by Alex Kallimanis

For many the most daunting aspects of information security are the policies that shape the IT practices of the business. This “Information Security Program” builds a written framework that defines …

You’re Fired! Now Give Me Your Password

In All by Mike Abbott

    “You’re FIRED!” ( now give me your password) Losing an employee is not usually a good experience. If they leave voluntarily, you lose a valuable asset. If they …

IT Defense in Depth Part II

In All by Mike Abbott

    Defense in Depth Part II In our last blog we started talking about the different layers of security necessary to fully defend your data and business integrity. Today …

See All All Posts

Data Protection Laws and PIIs

In All, Blog by Mike Abbott

    Data Protection Laws and PIIs   Last week we discussed the overall concept of “Data Protection Laws,” which govern the handling and securing of specific data. While these …

Are you subject to Data Protection laws?

In All, Blog by Mike Abbott

    Are you subject to Data Protection laws?   This blog introduces a new topic that many may be unaware of: Data Protection laws. These are laws that define …

Ransomware Part II

In All, Blog by Mike Abbott

    Ransomware Part II   In our last blog, we explained what ransomware is, and why it can be an especially troublesome virus. Today, let’s look at what you …

Ransomware part I

In All, Blog by Mike Abbott

    Ransomware part I   The daily reports of cybercrime are important reminders about the need to protect your business from malicious behavior that could threaten the success of …

The Cloud: Are there security issues

In All, Blog by Mike Abbott

    The Cloud: Are there security issues?   For many, the idea of offloading their data to another physical/virtual location can seem like a security risk. It seems counter …

See All Blog Posts

Don’t Get KRACK-ed

In All, Blog, BYOD, Manage Risk by Alex Kallimanis

By now you may be aware of the recent discovery of a security vulnerability in the WPA2 security standard for Wi-Fi networks, as reported by CNN, Fox News, cnet and …

See All BYOD Posts
See All Cloud Posts
See All Communicate Better Posts
See All Company Culture Posts
See All Compliance Posts
See All Contain Costs Posts

Don’t Get KRACK-ed

In All, Blog, BYOD, Manage Risk by Alex Kallimanis

By now you may be aware of the recent discovery of a security vulnerability in the WPA2 security standard for Wi-Fi networks, as reported by CNN, Fox News, cnet and …

See All Manage Risk Posts
See All News Posts
See All Operate Efficiently Posts
See All Plan Strategically Posts
See All Security Posts
See All Software Posts

Benefits of Using VoIP Technology

In All, Uncategorized by Mike Abbott

Benefits of Using VoIP Technology More and more businesses are implementing Voice over Internet Protocol or VoIP technology because of its versatility, flexibility and cost effectiveness. With new developments in …

Disaster Recovery Plans: Do You Have One?

In All, Uncategorized by Mike Abbott

Disaster Recovery Plans: Do You Have One? Disaster recovery and business continuity plans are issues that almost all small businesses fail to think about. More frequently, they decide they haven’t …

See All Uncategorized Posts