What to Do If Your Website Displays a “Not Secure” Warning

In July 2018, Google released Chrome version 68 which displays a security warning to any Chrome user who visits a website that is not encrypted. If you or your website visitors see a red triangle and the words “not secure” next to your web address, you should encrypt your website...

Security Alert: Your Website Might Display This Warning Starting July 2018

In July 2018, Google will publish release 68 of its Chrome web browser. Unlike prior releases of Chrome, this version can significantly affect your website traffic and possibly affect your company’s reputation. Chrome 68 will include a security check to detect whether your website is encrypted. If it is not,...

Winter Storm Riley creates havoc for technology companies.

When Winter Storm Riley knockouts the Northeast of the United States many small companies were not ready for the onslaught of outages that were to take place on March 2, 2018 across the globe. Companies like Amazon, GoDaddy, Capital One, and Google according to Down Detector were just some of...

Microsoft Will End Security Updates for These Products in 2018

Upgrading software applications that are no longer supported by their developers is a critical step in maintaining your online security. Microsoft will stop supporting certain versions of their products in 2018. This means they will no longer offer security updates to these products. Hackers are constantly on the lookout for...

How to mitigate Rogue Access with ConnectID and ShareSync

[mp_row bg_video_youtube_repeat="true" bg_video_youtube_mute="true" bg_video_repeat="true" bg_video_mute="true"] [mp_span col="12"] [mp_row_inner bg_video_youtube_repeat="true" bg_video_youtube_mute="true" bg_video_repeat="true" bg_video_mute="true"] [mp_span_inner col="12"] [mp_text] Mitigate Rogue Access with ConnectID & ShareSync Mitigate Rogue Access with ConnectID & ShareSync [/mp_text] [/mp_span_inner] [/mp_row_inner] [mp_row_inner bg_video_youtube_repeat="true" bg_video_youtube_mute="true" bg_video_repeat="true" bg_video_mute="true"] [mp_span_inner col="12"] [mp_text] According to Osterman Research 2014 SMB Rogue Access study, 68% of ex-employees...

Procedures to help prevent Rogue Access (checklist)

[mp_row bg_video_youtube_repeat="true" bg_video_youtube_mute="true" bg_video_repeat="true" bg_video_mute="true"] [mp_span col="12"] [mp_text] Best practices for tracking access to IT systems [/mp_text] [/mp_span] [/mp_row] [mp_row bg_video_youtube_repeat="true" bg_video_youtube_mute="true" bg_video_repeat="true" bg_video_mute="true"] [mp_span col="12"] [mp_row_inner bg_video_youtube_repeat="true" bg_video_youtube_mute="true" bg_video_repeat="true" bg_video_mute="true"] [mp_span_inner col="12"] [mp_text] Osterman Research recently surveyed knowledge workers about their access to former employers’ IT systems. An incredible...

Do Ex-Employees Still Have Access to Your Corporate Data?

[mp_row bg_video_youtube_repeat="true" bg_video_youtube_mute="true" bg_video_repeat="true" bg_video_mute="true"] [mp_span col="12"] [mp_row_inner bg_video_youtube_repeat="true" bg_video_youtube_mute="true" bg_video_repeat="true" bg_video_mute="true"] [mp_span_inner col="12"] [mp_text] Do Ex-Employees Still Have Access to Your Corporate Data? [/mp_text] [/mp_span_inner] [/mp_row_inner] [mp_row_inner bg_video_youtube_repeat="true" bg_video_youtube_mute="true" bg_video_repeat="true" bg_video_mute="true"] [mp_span_inner col="12"] [mp_text] Organizations of all sizes have a problem that most of them are not addressing adequately:...

Introduction to Rogue Access

[mp_row bg_video_youtube_repeat="true" bg_video_youtube_mute="true" bg_video_repeat="true" bg_video_mute="true"] [mp_span col="12"] [mp_row_inner bg_video_youtube_repeat="true" bg_video_youtube_mute="true" bg_video_repeat="true" bg_video_mute="true"] [mp_span_inner col="12"] [mp_text] Osterman Research shares why your ex-employees could be your next big security threat   [/mp_text] [/mp_span_inner] [/mp_row_inner] [mp_row_inner bg_video_youtube_repeat="true" bg_video_youtube_mute="true" bg_video_repeat="true" bg_video_mute="true"] [mp_span_inner col="6"] [mp_text] What happens when an employee leaves your company? If you’re...

Lunch & Learn111417

Many small business don't understand the need to protect their data until it is too late. If your data is recover and with a standard 500GB Hard Drive. It can cost nearly $3,000 and that is if they can actully get the data back. Let's not include having a tech...

Guest Wi-Fi access should always be ‘easy, peasy’

Guest Wi-Fi is a critical component of the digital experience for many companies. Follow these tips to ensure access to yours is a simple and secure—and doesn’t frustrate users. My kids use the expression “easy, peasy” to describes something that is super simple. For example, I might ask my youngest...