Why Data Security Should Be Treated as an Operating Expense

Traditionally, data security has been treated as a capital expense. Even if they’re regularly updated, firewall and antivirus programs have only been purchased–and thought about-every few years. In the past, this was enough to keep your business safe.

But cyber threats are advancing and evolving at a breakneck speed. Letting your data security decisions be dictated renewal dates is no longer acceptable to keep your business protected. Shifting your data security decisions to be part of your business operations, rather than just a capital expense, will keep you safer and make budgeting easier.

Read More »

Are you paying for internet speeds you’re not getting?

One of the best things a business can do to improve productivity is to provide employees with reliable technology that doesn’t slow them down. A major piece of this (especially for companies with cloud based applications) is your internet speed.

Current provider speeds range from 20 MB/s to well over 200 MB/s compared to the old T1 speeds of 1.5 MB/s. Unfortunately, there are businesses who are paying for very fast connections from their providers but aren’t getting what they are paying for – and not because their provider is ripping them off. Many companies aren’t getting the performance they’re paying for because they’re using an old firewall.

Read More »

Top 6 Security Features in Office 365

As more and more businesses move to the Cloud, the misconception that the cloud isn’t safe is slowly going away. Business owners understand that Cloud companies like Microsoft and Google have more resources dedicated to security. Don’t believe it? Here’s how Microsoft keeps Office 365 secure.

But it’s up you to make your own environment secure. If you’re an Office 365 user, there are plenty of apps and features in Office 365 (and availble add-ons) to help you do that. These are our favorite Office 365 security features and add-ons. We use all of these in our own organization.

Read More »

From the Trenches: Lessons to Learn from a Data Breach

More and more customers are embracing cloud services. The benefits are clear: less capital expense, simplified management, access to important data across devices and without the hassle of VPN. However, some of these benefits can expose your business to unnecessary risks if extra security precautions are not taken into consideration. 

That was the case with a customer who recently experienced a data breach. For their privacy, we aren’t including their name. 

Read More »

How to Improve Your Security with Multi-Factor Authentication

It’s no secret that the cyber security landscape is getting scarier every day. Ransomware is spreading like wildfire and cybercriminals are getting better at their job – and make no mistake, cyber-crime is an industry. According to some experts, “If you haven’t been hacked yet, the chances are even greater in 2017.”

It is easy to understand why security experts and business owners are scrambling to come up with ways of making it harder for unauthorized users to enter their network. One of the best methods for controlling access has actually been around for a few years: Multi-Factor Authentication.

Read More »

Why You Should be Using Office 365 Audit Logs

As IT professionals we get asked to fix things daily (which is fine because that’s our job), but every once in a while, we find ourselves fixing the same issue over and over again. Something like a file getting deleted typically isn’t a huge issue since it can be restored. If the same file has to be restored multiple times, there may be a deeper problem. For Office 365 users, this is where audit logs come in handy.  

Read More »

Are you giving cyber criminals easy access to your data?

Small and midsize businesses are big targets for cyber criminals. IBM estimates SMBs are the target of 62 percent of all cyber-attacks (around 4000 every day). It’s very likely if you haven’t already been a target, you will be soon. Recovering from a cyber-attack isn’t easy – 60 percent of small businesses that fall victim to an attack fold within six months .
Read More »

Watch Out for This Office 365 Phishing Email

Office 365 users are now being targeted in a pretty convincing looking phishing attack. 

Phishing attacks, a common tactic used by cyber criminals to try to trick you into giving them your information, are nothing new. In fact, it's likely if your company has already been targeted by phishing (and if you haven't been, it's a matter of when - not if) and it's getting harder and harder to spot the malicious emails. 

Read More »

2016 Review: Data Security Threats and Trends

After the cyber security disaster that was 2015, one might think that 2016 would have been better. Think again. The security breaches seem to continue to grow in size and impact each and every year and 2016 was no exception. From government agencies to universities to businesses (both enterprises and small businesses), it seems nobody was immune. As more and more of our lives exist online it becomes harder and harder to keep ourselves and our data secure.

Read More »

Stop Storing Your Passwords on Your Desktop

You’ve heard the advice before about good password practices: Use a combination of uppercase, lowercase, numbers and special characters. Don’t use common words (especially “password”). Change your password regularly. Use a different password for every login.

You follow them as best you can. Maybe your company even has the policies enforced so you must follow them. But it gets hard to remember all those weird passwords. So, you start writing them down. Maybe it’s an Excel file saved on your desktop. Or emails you saved in a folder in Outlook. Or a piece of paper under your computer.

Stop doing this. Right now.

Read More »

Subscribe to Our Newsletter

Ultimate Guide to Budgeting for Technology