Advanced Security Policy

In All by Alex KallimanisLeave a Comment

On top of the general protections that are outlined in our Core Information Security Program there are a number of a la carte policies that may be required based on …

Is Your Website Mobile Optimized?

In All by Mike AbbottLeave a Comment

    Smaller firms often struggle just to keep up with maintaining a website. Worrying about a scaled­ down version for mobile users seems like just too much trouble. Today’s …

Password Basics That Are Still Ignored

In All by Mike Abbott

    You can have all the locks on your data center and have all the network security available, but nothing will keep your data safe if your employees are …

Written Policies

In All by Alex Kallimanis

For many the most daunting aspects of information security are the policies that shape the IT practices of the business. This “Information Security Program” builds a written framework that defines …

You’re Fired! Now Give Me Your Password

In All by Mike Abbott

    “You’re FIRED!” ( now give me your password) Losing an employee is not usually a good experience. If they leave voluntarily, you lose a valuable asset. If they …

IT Defense in Depth Part II

In All by Mike Abbott

    Defense in Depth Part II In our last blog we started talking about the different layers of security necessary to fully defend your data and business integrity. Today …

IT Defense In Depth Part I

In All by Mike Abbott

    In the 1930s, France built a trench network called the Maginot Line to rebuff any invasion. The philosophy was simple: if you map out all the places an …

Data Security: A People Problem

In All by Mike Abbott

    Phishing Scams – A People Problem There are some things that only people can fix. There are many security risks to which your data is susceptible, but there …

What is Ransomware and How Can it Affect Your Business?

In All by Mike Abbott

    This cyberattack scheme hasn’t garnered nearly as much attention as the usual “break-in-and-steal-data-to-sell-on-the-Internet version,” but it can be even more debilitating. Ransomware attacks have begun appearing in the …