Posts

5 Important Employee Cybersecurity Training Tips

Employee cybersecurity training is, beyond a doubt, one of the most important things you can do to prepare your organization for the threats that exist now and into the future.

Here are 5 cybersecurity training tips to prepare your staff so that they can keep your intellectual property, data and systems safe: Read more

Top 5 ways to prepare for a ransomware attack

Ransomware attack!
A top cybersecurity threat for businesses today is ransomware – a type of malicious software designed to block access to a computer system until a sum of money is paid. In fact, 12 Connecticut state agencies were just attacked with ransomware, with 160 computers affected. Luckily, the attack was thwarted by the state’s excellent multi-layered cybersecurity strategy.

Your business needs to be prepared too. And just like the state of CT, the multi-layered approach is the best way to do it.

Here are the top 5 ways to prepare for a ransomware attack: Read more

How to get your business ready for the future of IT (part 2)

In our first digital transformation post, we talked about the basics of digital transformation…what it means, how you prepare for it and the importance of a strong and secure infrastructure. If you missed that article, click here to read it.

In this post, we’ll talk about how the role of IT in business has changed over time and how your business approach can change along with it.

The IT Management Pyramid

The pyramid below describes the efficacy of your IT strategy as it improves and develops on the way to Digital Transformation. The goal is to move up the pyramid! The idea is to be continually thinking about how you use IT, the role of IT in business strategy, and where your IT is focused. Each tier of the pyramid is explained more fully below, along with the limitations and benefits of each stage as your business develops its IT strategy. Read more

How to get your business ready for the future of IT (part 1)

The future of IT = Digital Transformation

You may be hearing a lot about digital transformation right now…but, what does it mean, and what could it mean for your business? Keep looking back at our blog as we unravel the mystery of Digital Transformation.

So, what is it?

In short, digital transformation means preparing your business to take advantage of the massive technology shift that is currently ongoing. It’s not too late…you can do it! This technology shift, sometimes called the 4th Industrial Revolution, is only in its infancy.

We’ve only just started?

Read more

NIST compliance: it’s just good cybersecurity practice

NIST compliance

We all know that cybersecurity risks are not going away. The truth is, they’re only getting worse. Cyber-criminality is an industry, with a lot of money to be made. And as we’ve seen from the news about security breaches lately, they’ll take just about anything they can get their hands on!

The government has a plan!

Hmm…that sounds a little scarier than it is and not completely accurate. The National Institute of Standards and Technology (NIST) is a government agency responsible for maintaining cybersecurity standards for all government agencies. As you may know, they have created a set of standards for non-governmental organizations that handle Controlled Unclassified Information (CUI), NIST 800-171. They’ve created the standards, now you have to create the plan.

What is NIST compliance?

Read more

Security flaws Spectre and Meltdown – what you need to know!


As you may have already heard in mainstream publications or on social media, computer researchers have recently found security flaws in the CPUs of most modern computers. These flaws, known by the names Spectre and Meltdown, are the results of design flaws in the hardware which is found in PCs, Apple, networking equipment and more. These flaws have actually been there for years, but until recently were both unknown and unexploited. This security issue affects almost every computer, server, and personal device. The hardware bug allows malicious programs to steal data that is being processed in your computer’s memory, making password managers, emails, messaging, documents, photos and more, vulnerable.  Read more