Posts

What’s the story? How our manufacturing clients use technology – Part 1

I’ve been heading out “into the field” lately to talk to some of our manufacturing clients about what they feel are their most important uses of technology. Read more

Compliance Crackdown – NIST 800-171

If you have, or are downstream of, a government contract, the days of indifference about NIST 800-171 compliance are ending. The Department of Defense has begun enforcing cyber regulations on contractors to protect important data, including CUI (Controlled Unclassified Information). Not only that, but they have been sending out memos with further, and more in-depth, expectations. Read more

Our IT vision for 2019

We are focused on our mission of helping our clients gain a competitive edge from their technology. This year we are looking closely at 3 key areas that are critical to supporting your success. Take a look at this quick video:

The Elephant in the Room Keeps Growing!

 

It seems that no one wants to talk about it, or acknowledge its existence, but the elephant in the room is the continuing and constant growth of ransomware (malicious software designed to deny access to a computer system or data until a ransom is paid).

One of our partner companies, Datto, produces a fantastic yearly report on the global state of ransomware as reported by over 2400 managed service providers (MSPs) around the world. The report is filed with excellent information in a very readable format.  You can download the whole thing here.

If you don’t want to tax yourself with the whole report, below are some of the key points and main takeaways that are important to you and your business: Read more

8 quick ways to reduce your cyber risk

Whether it’s the risk of a security breach or the possibility of hardware failure, every company has cyber risk that can affect their productivity or even their ability to continue running their business.

While there are no real shortcuts to proper cybersecurity and network management, there are a few simple ways to reduce your risks.

Here are 8 things you can do to reduce your cyber risk quickly: Read more

Cybersecurity reminder!

Today the Connecticut Higher Education Trust College Savings Program (CHET) had a over a $1 million stolen in a security breach. You can read more about it here.

This is just the latest in a stream of cybersecurity breaches hitting the public and private sectors. Cybersecurity risks are on the rise and we all need to remain extra vigilant and careful. Pay attention to what you’re doing when you’re online, what you’re clicking in your emails, and who you are giving your information to.

Hackers are making money…so they aren’t going to stop anytime soon!

Give us a call if you want to learn more about your organization’s cybersecurity risks.
860-249-1200

Cybersecurity for compliance: Top 5 reasons you may need a Security Information and Event Management (SIEM) system

A security auditor may have recommended, or even insisted (in case of compliance requirements), that you have a Security Information and Event Management (SIEM) system in place.

Your first question might be, “What is that?” followed closely by, “It costs how much?” followed right after that by, “That’s a lot of money. Do I really need that?” Let us try to answer these questions for you.  Read more

5 Important Employee Cybersecurity Training Tips

Employee cybersecurity training is, beyond a doubt, one of the most important things you can do to prepare your organization for the threats that exist now and into the future.

Here are 5 cybersecurity training tips to prepare your staff so that they can keep your intellectual property, data and systems safe: Read more

Why Standardize your IT?

A state of (IT) confusion

The CEO has a Dell laptop with Windows 10, the finance guy has a Lenovo desktop with Windows 8, and your office co-worker has a Macbook. Some folks use Dropbox, others use Sharepoint, and still others use Google Drive. Linda has McAfee, Jane has Norton, and Bob has ESET. Alex VPNs into the network, while Sue uses remote desktop.

Does it matter?

These scenarios are all too familiar and you may think, ‘does it matter? All those folks can work, they can all share files, have access to the network, and they all have antivirus protection’. That may be true…but what happens when you need to update, replace, find, learn how to use, or support something. That’s when you’ll be pulling out your hair!

Higher level thinking

Handling your business IT with inconsistent standards is not only costly in terms of time and money but could be potentially damaging to your data and intellectual property in the case of lax cybersecurity standards. Read more

Top 5 ways to prepare for a ransomware attack

Ransomware attack!
A top cybersecurity threat for businesses today is ransomware – a type of malicious software designed to block access to a computer system until a sum of money is paid. In fact, 12 Connecticut state agencies were just attacked with ransomware, with 160 computers affected. Luckily, the attack was thwarted by the state’s excellent multi-layered cybersecurity strategy.

Your business needs to be prepared too. And just like the state of CT, the multi-layered approach is the best way to do it.

Here are the top 5 ways to prepare for a ransomware attack: Read more