Recently, we had a really clogged up office kitchen sink. We’ve got some handy folks on our team who could have looked at it, but instead we remembered two important things…1) we are not experts at fixing clogged sinks and 2) we have much better things to do with our time. The solution here: OUTSOURCE! Read more
Our manufacturing clients and prospects often have similar questions about outsourcing as they consider their technology needs. Let us answer some of these concerns:
- Don’t we need someone that understands our unique facility and needs?
Your facilities are unique. We have the best tools available that allow us to quickly map and document your system, so we can be up to speed on your environment in the blink of an eye. This is part of our discovery process, which happens before we even start discussing any needs or ways to improve your system.
Your needs are unique. A virtual Chief Information Officer works directly with your team to get to know your company, your needs, and your business strategy. It is this person’s role to fully understand your needs as an organization and to devise an IT strategy that not only works for today but prepares you for tomorrow. Read more
It seems that no one wants to talk about it, or acknowledge its existence, but the elephant in the room is the continuing and constant growth of ransomware (malicious software designed to deny access to a computer system or data until a ransom is paid).
One of our partner companies, Datto, produces a fantastic yearly report on the global state of ransomware as reported by over 2400 managed service providers (MSPs) around the world. The report is filed with excellent information in a very readable format. You can download the whole thing here.
If you don’t want to tax yourself with the whole report, below are some of the key points and main takeaways that are important to you and your business: Read more
Advanced Manufacturers need new talent and must retain the talent they have. Technology may not be able to solve the problem, but it may be able to help. Take a look at the ideas below. Two focus on recruitment, the rest on retention. All are important to think about! Read more
Whether it’s the risk of a security breach or the possibility of hardware failure, every company has cyber risk that can affect their productivity or even their ability to continue running their business.
While there are no real shortcuts to proper cybersecurity and network management, there are a few simple ways to reduce your risks.
Here are 8 things you can do to reduce your cyber risk quickly: Read more
On October 3rd, IT Direct was honored again with a Marcum Tech Top 40 award, presented at this year’s Connecticut Technology Council ConnectiTECH Awards event.
The Marcum Tech Top 40 has honored over 400 Connecticut-based technology and tech-enabled companies since 2008. The awards recognize technology leaders in six industry sectors: Advanced Manufacturing; Energy and Environmental; Life Sciences; New Media, Internet, and Telecom; IT Services; and Software. IT Direct falls within the IT Services category. Read more
IT downtime in your business can be caused by so many things – hardware failure, power surges, security breaches, storms, coffee spills, just to name a few. But no one cares WHY they’re down when they count on being up and running!
So, what’s the quickest way to get your business running again? At IT Direct, we use the axiom “proper preparation prevents poor performance,” in other words, plan ahead!
Yup, not the answer you were hoping for, I’m sure, but it’s the best way to ensure that downtime doesn’t ruin your day, your week, or even, possibly, your business. Read more
In our last blog post, we gave an overview of NIST compliance and why it is so important. In this blog post, we provide you with a quick, very high-level breakdown of the NIST 800-171 Requirement Families.
Each family falls under one of the three main functions of cybersecurity: protect, detect, or recover.
- Protect – Protect your systems from harm or intrusion to the highest level possible
- Detect – Detect when a breach is in progress or has occurred, from either inside or outside your organization
- Recover – Ensure you have the systems and procedures in place to recover from an incident as efficiently and effectively as possible, while following all legal requirements
There are 14 families of requirements in NIST 800-171. In the NIST Special Publication document, the families are presented in alphabetic order, but it may make a little more sense to divide them into their security function. So, that’s what we’ve done below: Read more
When does adding two things together equal more than the sum of their parts? When you can take a few pieces of information, put it together, and come to a conclusion that saves you tons of time or resources! This is one of our very favorite things to do for our clients!
How do we do it?
Sometimes multiple helpdesk calls come in and they seem unrelated and may even be assigned to different techs to solve. They may even be quick issues, like difficulty updating a password, or a pop-up that keeps occurring from time to time for low disk space on a user’s computer. To an outside eye, these issues may seem coincidental or completely unrelated. But, our POD teams get to know our clients so well that they pick up on these seemingly unrelated events and can make changes that save everyone time and energy.
Putting it together
One client’s Read more
The President of IT Direct, Ari Santiago, recently gave an hour-long webinar on NIST compliance. He provided a quick, but very thorough overview of what NIST 800-171 is, why it’s important, and the 14 families of the framework.
If you’d like to listen to the entire webinar, you can find it here on YouTube.
In today’s blog post, we’re going to give an overview of that overview – a 60,000 ft view, if you will! Read more
67 Prospect Avenue, Suite 202
West Hartford, CT 06106