How Managed Services Helps Small and Medium-sized Businesses Thrive

Small and medium-sized businesses often don’t have the budget or a justification for a full-time IT department and are turning with ever-increasing regularity to cloud-based computer managed IT services. It was the mid-twentieth century when computers began finding footholds in business operations. Most often, computers were used for back office operations. Today, computers are ubiquitous…

Read More

How Auto-Fill Can Leave Your Business Vulnerable to a Phishing Attack

Relying on the pervasiveness of auto-fill, hackers have developed a new phishing technique that uses this standard browser feature and which could put your business’ data security at risk. Many employees rely on their web browser’s auto-fill feature to make day-to-day Internet tasks easier and more convenient. From Safari and Firefox to Google Chrome and…

Read More

How to Use Your Chrome Browser to Your Advantage

Your Chrome browser has many settings to protect your privacy and keep advertisers from viewing your browsing history. Google’s Chrome web browser is popular for many reasons. It’s a fast, efficient browser and includes a wide library of extensions available to the more savvy internet user. From reduced memory usage to being able to hide…

Read More

Weekly Tech Tip: Create a mobile device action plan

Mobile devices can create significant security and management challenges, especially if they hold confidential information or can access the corporate network. Require users to password protect their devices, encrypt their data, and install security apps to prevent criminals from stealing information while the phone is on public networks. Be sure to set reporting procedures for…

Read More

The Business Case for the CFO to be Responsible for Cyber Security

As the threat of cyber attacks and cyber risk continues to increase, I foresee CFOs across the world learning, adapting and building competency to successfully address this critical challenge. Cyber security wasn’t in the business lexicon until the 21st Century began. Today, cyber security is at the top of the list at company board meetings…

Read More

Bay State Bills: Understanding Massachusetts’s New Law On Data Privacy

Seeking to improve cyber security, a new Massachusetts law compels companies to limit systems access, train employees, install protective software and physically secure their computers. The importance of cybersecurity goes far beyond individual and business needs. As recent cyber attacks demonstrate, the loss of sensitive information can put all of society at risk. Governments are…

Read More

Weekly Tech Tip: Control physical access to computers and network components

Prevent access or use of business computers by unauthorized individuals. Laptops can be particularly easy targets for theft or can be lost, so lock them up when unattended. Make sure a separate user account is created for each employee and require strong passwords. Administrative privileges should only be given to trusted IT staff and key…

Read More

Watch Out! 2017 Top Security Threats Against Businesses Are Ransomware & Maladverts

Security experts are warning businesses of all sizes to stay alerted for ransomware and mail advert attacks against them. Security experts are warning businesses of all sizes to stay alerted for ransomware and maladvert attacks against them. In fact, the Federal Bureau of Investigation renewed its warnings concerning the increasing pace of ransomware. Fact Check:…

Read More

Tech Trends To Watch For In 2017

There weren’t many high points in 2016 as far as a lot of people are concerned. But while bright spots were few and far between, they were there. And most of them had to do with new technology innovations. A lot of these innovations have the potential to create significant changes in the technology landscape…

Read More