Mobility Management Update

It is impossible for me to recall a single customer that does not have some sort of mobile access to corporate resources. Increased productivity, cloud applications, and expectations of quick responses are driving the need for mobile access to corporate resources. However, there are two main concerns customers have, or should have, when allowing users…
Read More


Phishing – How Many Ways Can You Be Baited?

Every data breach and online attack seems to involve some kind of phishing attempt to steal password credentials, to launch fraudulent transactions, or to trick someone into downloading malware. According to a Verizon cybersecurity report, an attacker sending out 10 phishing emails has a 90 percent chance that one person will fall for it. Do…
Read More


Are Your Vendors Putting You at Risk?

There are numerous security risks that come from giving third-party vendors access to your network and data. According to the Ponemon Institute, 49% of companies had a data breach caused by a third-party vendor. In fact, hackers themselves admit that contractors are often their primary target. Some of the most devastating breaches in the past…
Read More


The Sufferings of Software and Business Intelligence

Are you one of those people that can do your job efficiently with the software your company has?  Are there no extra steps in your day-to-day process because of how wonderful your software programs work together?  When you need information, can you just get it with a click of a button – in the format…
Read More


Why You Need A Risk Assessment

Regulatory requirements are on the rise across all sectors of our economy, from financial services industries to the healthcare arena. Each new regulation adds complexity and introduces additional concerns for organizations to address. Due to this new demand, it’s more important now than ever for organizations to be security conscious while developing and implementing proper…
Read More


Start Off 2018 By Protecting Your Business; Disaster Recovery (DR)

Disaster Recovery (DR) is something that every business should consider.  In today’s world, it’s difficult to think of an environment that doesn’t need DR.  Some organizations think they don’t need DR but in reality they do. Some think they are ready for a disaster but they are not. I have found that most companies fall…
Read More


New & Exciting Hardware from Cisco!

New hardware releases are common in the technology field, but very few of these new hardware releases get me as excited as a couple of the products that Cisco has recently announced! Similar to other vendors, Cisco has released a variety of new technologies and solutions to kick off the new year. However, I’m most…
Read More


How Secure Will You Be Shopping This Holiday Season?

It’s almost that time of year again! The two busiest shopping days of the year are upon us, and while you’re out looking for the best deals, identity thieves are just as busy trying to steal your financial information. To help yourself stay secure, keep the following tips in mind while shopping both online or in…
Read More


OpenDNS: A Cloud-Based Security Solution for Your Business

  Cisco Umbrella, also know as OpenDNS, is a cloud based security solution that is designed to protect users while they are browsing the web.  While being filtered through the Cisco Umbrella cloud, users can surf the net with confidence knowing that they are being protected by one of the most comprehensive web security solutions…
Read More


Third Party Apps – How Secure Are They?

Third-party apps—we all use them, but do you really know the security concerns surrounding them? Many of them request access to your personal information. This includes access to your location, photos, contacts and messages. What’s worrisome is that these apps can be vulnerable to digital snoops, data breaches, and real-world thieves. The recent trend towards…
Read More