Cybersecurity for compliance: Top 5 reasons you may need a Security Information and Event Management (SIEM) system

A security auditor may have recommended, or even insisted (in case of compliance requirements), that you have a Security Information and Event Management (SIEM) system in place.

Your first question might be, “What is that?” followed closely by, “It costs how much?” followed right after that by, “That’s a lot of money. Do I really need that?” Let us try to answer these questions for you.  Read more

5 Important Employee Cybersecurity Training Tips

Employee cybersecurity training is, beyond a doubt, one of the most important things you can do to prepare your organization for the threats that exist now and into the future.

Here are 5 cybersecurity training tips to prepare your staff so that they can keep your intellectual property, data and systems safe: Read more

Life lessons

Life Lessons

Yesterday I went to a conference that was designed for women entrepreneurs to learn from other women entrepreneurs.  It was a terrific event, put on by the Greater Hartford SCORE organization, a volunteer-based national group in which retired executives use the knowledge and skills they gained throughout their careers to mentor small business owners on starting and developing their business.

The panel was filled with five incredible, successful women who enjoyed telling the stories of their businesses, their lives, and all the things they learned along the way. The themes that stood out are important, not only for entrepreneurs, but for all business leaders: Read more

Why Standardize your IT?

A state of (IT) confusion

The CEO has a Dell laptop with Windows 10, the finance guy has a Lenovo desktop with Windows 8, and your office co-worker has a Macbook. Some folks use Dropbox, others use Sharepoint, and still others use Google Drive. Linda has McAfee, Jane has Norton, and Bob has ESET. Alex VPNs into the network, while Sue uses remote desktop.

Does it matter?

These scenarios are all too familiar and you may think, ‘does it matter? All those folks can work, they can all share files, have access to the network, and they all have antivirus protection’. That may be true…but what happens when you need to update, replace, find, learn how to use, or support something. That’s when you’ll be pulling out your hair!

Higher level thinking

Handling your business IT with inconsistent standards is not only costly in terms of time and money but could be potentially damaging to your data and intellectual property in the case of lax cybersecurity standards. Read more

How to get your business ready for the future (part 3) – Business Intelligence

How to get your business ready for the future (part 3) – Business Intelligence

In our previous two digital transformation blog posts we discussed the infrastructure you need before you can digitally transform your organization and we talked about how to change your approach to technology so that it becomes a strategic component of your business. In this blog post, we get to the crux of what digital transformation is all about…Intelligence

At the end of the day, Digital Transformation is all about gaining intelligence on your business that helps you to make better decisions, enabling you to engage and help your clients, empower your employees, optimize your operations, or transform your products.  Read more

Is your IT strategy cohesive across your entire business?

Is your IT strategy cohesive across your entire business?

In a previous blog post, we talked about the role of IT strategy and how it has changed over time. We described how to move up from a Reactive break-fix model and through the IT Pyramid to increasingly use your IT to drive value in your business.

What happens with an incohesive strategy?

Recently, we discovered a case where part of the business was still in break-fix mode, while other parts of the business had moved into higher levels of IT efficacy. Read more

2018 Spending Bill is good for CT Manufacturers

Senator Chris Murphy at manufacturing plant in Cheshire

Omnibus Spending Bill has positive effects on CT Manufacturing

As a member of a legislative council on Manufacturing, Ari Santiago, President/CEO of IT Direct, recently received this update from Senator Chris Murphy’s office on some of the positive effects of the new spending bill on Manufacturing in Connecticut. We thought you might like to read it too!


Good morning,

You may have heard that Congress voted on a $1.3 trillion spending bill last week. Senator Murphy supported this bill and wanted me to update you on what this means for Connecticut’s manufacturers, please feel free to share with your respective groups. Read more

Efficacy of technology – can technology meet everyone’s needs?

Efficacy of technology – can technology meet everyone’s needs?

During a recent meeting with a prospective client, a CEO of a growing manufacturer in Connecticut, he described what he was looking for in technology in terms of efficacy.

Efficacy – the ability to produce a desired or intended result

I thought this was an interesting way to describe what he was looking for – efficacious technology. It leads to the question…what is your desired result? I think he chose this word, because this answer will be different for every single individual in an organization and is entirely dependent on their role. Yet, the request remains that technology be efficacious, or leading to results, for everyone.  Read more

Top 5 ways to prepare for a ransomware attack

Ransomware attack!
A top cybersecurity threat for businesses today is ransomware – a type of malicious software designed to block access to a computer system until a sum of money is paid. In fact, 12 Connecticut state agencies were just attacked with ransomware, with 160 computers affected. Luckily, the attack was thwarted by the state’s excellent multi-layered cybersecurity strategy.

Your business needs to be prepared too. And just like the state of CT, the multi-layered approach is the best way to do it.

Here are the top 5 ways to prepare for a ransomware attack: Read more

How to make IT strategy a key component of your business strategy

How to make IT strategy a key component of your business strategy

Technology is a key component of your business. Are you doing enough to make sure that this key component is helping your company be more productive and efficient and prepare for the future? Chances are, if you don’t have someone dedicated to regularly looking at your technology with one eye on business strategy and the other on the future, the answer is probably no. Below we outline what this role can look like and then we use two recent examples from our clients to show how this role works in action. Read more