IT Red Flags to Watch Out For As someone running a SMB, you probably have a lot on your plate. You are the core decision maker, responsible for growing your… read more →
Assessing your MSP in the first appointment Handing over your IT to a MSP is a major decision. Who do you choose and more importantly, how? While there’s no rulebook… read more →
Hiring seasonal staff? Here are a few things to consider from the IT perspective. In many industries, there are seasonal spikes in business around specific times. For example, CPAs/Accounting firms,… read more →
3 Things to consider before you sign-up with a cloud services provider More and more SMBs are migrating to the cloud and that is not a surprise considering the numerous… read more →
Ransomware Part II In our last blog, we explained what ransomware is, and why it can be an especially troublesome virus. Today, let’s look at what you can do to… read more →
Ransomware part I The daily reports of cybercrime are important reminders about the need to protect your business from malicious behavior that could threaten the success of your business. There… read more →
Smaller firms less likely to keep up to date on the basics that protect them. On the never ending problem of cyber security, small firms often do not have any/much… read more →
Cyberattacks and the vulnerability of the small business You cannot go a day without reading about some big name company or even government agency being hacked and critical data being… read more →
Denial is not a solution: Something you owe your customers and your employees Why do so many people procrastinate about making a will? Why is it so hard to get… read more →
Limited investment capital and planning for trouble Small businesses often fail to take the time to make business continuity plans. One aspect of a business continuity plan involves developing plans… read more →
Data Protection Laws and PIIs Last week we discussed the overall concept of “Data Protection Laws,” which govern the handling and securing of specific data. While these laws are wide… read more →
Are you subject to Data Protection laws? This blog introduces a new topic that many may be unaware of: Data Protection laws. These are laws that define fully, or in… read more →
We’re back. In the last post, we talked about building momentum toward a trade show exhibition. Today, let’s look at your efforts during the show itself. You already should have… read more →
Going to a tradeshow for the first time? Don’t make the mistake of viewing this as a 1-2 day discreet marketing event. Instead, view your exhibit at a tradeshow as… read more →
Smaller firms often struggle just to keep up with maintaining a website. Worrying about a scaled down version for mobile users seems like just too much trouble. Today’s blog is… read more →
You can have all the locks on your data center and have all the network security available, but nothing will keep your data safe if your employees are sloppy with… read more →
“You’re FIRED!” ( now give me your password) Losing an employee is not usually a good experience. If they leave voluntarily, you lose a valuable asset. If they have to… read more →
Defense in Depth Part II In our last blog we started talking about the different layers of security necessary to fully defend your data and business integrity. Today we will… read more →
In the 1930s, France built a trench network called the Maginot Line to rebuff any invasion. The philosophy was simple: if you map out all the places an enemy can… read more →
Phishing Scams – A People Problem There are some things that only people can fix. There are many security risks to which your data is susceptible, but there is one… read more →
Recent Comments