General Computing Executive Commentary
-
5 Tips For Malware Damage Recovery Success
1/17/2019
In dealing with recovery from a malware infestation, it is vital the IT Support Technician consider all the various forms of damage that may have occurred. Only by recognizing and investigating all of these categories can you ensure a successful recovery.
-
Cybersecurity Resolutions: Reevaluate These 3 Components Of The Security Infrastructure In 2019
1/3/2019
As each year winds down, we tend to look at the coming new year with hope and determination. We will get on that treadmill, we will eat less cake, and we will adopt sound security principals. However, the reality is, we change very little from year to year. That is until something happens to shock our systems.
-
Deeper MSP And VAR Security Services Should include Dark Web Monitoring
10/16/2017
Recent studies show that 73 percent of the U.S. population (237,736,346) have at least one compromised credential and 18 percent (60,441,444) have a compromised social security number found within the Dark Web, the portion of the Internet that is hidden from conventional search engines. In 2016-2017, 4.2 billion email account credentials have been identified for sale, not including fake data. The global cost of data breaches will reach $2.1 trillion by 2019.
-
MSPs And VARs: A Layered Approach To Security Offers The Best Defense Against Ransomware
9/14/2017
Ransomware is a terrifying reality for organizations today. We’ve all heard the horror stories. Hospitals that have seen their systems crippled and been forced to pay millions to rebuild in the aftermath of ransomware attacks. Police departments suffering the consequences of both paying or not paying ransoms, demonstrating these attacks to be a crime that authorities cannot protect themselves from, much less others. It’s become clear that ransomware can affect organizations of any size, in any industry.
-
Convergence Is King – Tips For VARs & MSPs On Integrated Voice Technology
8/29/2017
Having just returned from a major IT conference and trade show, I am reminded of the “early days” when IT and telecom were completely separate worlds. This event was riddled with what might have previously been categorized as telecom companies. It seems to me that the best way to capture the essence of the industry and the players that populate this space is to consider them “technology” companies.
-
How To Find The Right Next-Gen Security Solution
5/25/2017
Working in the cybersecurity world, I’ve noticed a lot of grandiose messaging from many security vendors lately, particularly in the wake of the recent #WannaCry ransomware malware attack .
-
How Your Role As MSP Changes When Clients Transition To The Cloud
5/24/2017
Now that cloud computing is more widely utilized by small and midsize businesses (SMBs), it is crucial for organizations to grasp ways they can maximize cloud-deployment solution benefits while minimizing the risks of moving traditional, on premise equipment such as servers to the cloud.
-
How To Add Security To Your Offering
5/19/2017
One of the most dynamic components of our services offerings is security. Not only is it ever-changing, but there are countless variations and forms of protection we need to be aware of and be providing to our clients. When you then consider the number of software manufacturers in that security space, it can become overwhelming and confusing as to how to approach security for your clients.
-
How To Safely Secure IoT Devices
5/17/2017
The Internet of Things (IoT) is a powerful business tool, opening new doors to connectivity, data, and efficiency. However, as IoT grows and becomes more common, the risks also increase.
-
The Cloud Can Cost You, But You Can Manage And Automate Any Technology Troubles
5/16/2017
Cloud applications are implemented as a means to create more organizational efficiency and as a solid business case for saving time and money.