Protecting Your Business from Cybercrime: Security Awareness Training

In late July 2020, technology giant Garmin fell victim to a ransomware attack that halted operations across the board. Encrypted company data meant customers could not access the information synced from their devices. Aviation and GPS communications were unavailable. Even customer support was inaccessible. Garmin ultimately opted to pay the multi-million-dollar ransom to regain access. Services were restored but it left customers

Understanding Recovery Time Objective (RTO) and Recovery Point Objective (RPO)

If there is anything that 2020 has taught us, it’s that anything can happen to disrupt normal business processes. Preparing for this disruption and the inevitable downtime it can cause is exactly why you must develop and consistently test a business continuity plan. No matter the reason – weather event, equipment failure, cyberattack, human error – your plan will guide the recovery

Reassessing Your Business Continuity Plan During a Pandemic

Business continuity plans are typically put into action in response to an internal emergency like a ransomware attack or physical facility damage. In some cases, a significant weather event, such as a hurricane, can trigger plan activation for multiple organizations at once. The COVID-19 pandemic, however, interrupted business processes for companies everywhere. We’ve already been through several months of unusual circumstances, and

9-1-1 Requirements for Multi-Line Phone Systems

What would happen if someone at your business needed to dial 9-1-1 for any reason? How would first responders know exactly where to go to quickly assist the individual who made the call? Obviously, your business address would be a good place to start. However, if your business is in a building with multiple floors and rooms or your property covers a

Using Two Factor Authentication to Secure Your Business

A lot of business continuity plans have been put to the test over the past few months. Chances are, you’ve found potential weak spots in your company’s IT environment, particularly in your software and network infrastructure. Make no mistake, cybercriminals are working overtime to take advantage of vulnerabilities wherever they find them. One common vulnerability relates to passwords and employee access to

Going Remote Due to COVID-19?

The COVID-19 pandemic is rapidly changing the way we do virtually everything, from education to eating out to business. As organizations and businesses move to online operations, there is a good chance you’ll be working remotely. For businesses and employees tasked with working from home, there are lots of new challenges on the horizon.   Cybercrime and Remote Work One thing is

Better Questions to Ask a Potential Managed Services Provider

If you’ve been considering outsourcing your IT to a Managed Services Provider (MSP), chances are you’ve done your due diligence in sorting out your options. Your web search probably returned numerous articles with titles along the lines of, “Questions to Ask a Managed Services Provider.” These articles are helpful in general, but often they don’t dig deeply enough into what you really

5 Technology Trends for 2020

You may have heard the term, “fourth industrial revolution” to describe the current state of technological advances. No matter how you feel about this idea, it’s undeniable that we’re living in a technologically advanced world. It’s not going to slow down any time soon. Technology Trends for 2020 As we move into the second decade of the new millennium, here are some

Energy Efficiency Through Virtualization

It might not surprise you to learn that one of the largest operational expenses for most businesses is energy use. The power used to heat, cool, and light an office of any size can be a significant cost, particularly when it comes to powering the various technology pieces in use. While switching to LED lighting and going paperless can help reduce costs,

Next Page »