Blog

29
Oct

Cybersecurity For Today’s Network Threats

The threats to your network and your phone are increasing each and every year. According to the independent IT-security institute, AV Test, over 350,000 new malware programs are written every day! Over 125 million new malware applications were written in 2017 alone. While the cybersecurity industry does a great job identifying threats and providing tools …

24
Sep

Spear Phishing and Fake URLs

Spear phishing attacks are often more successful than regular, broad-based phishing attacks because of the way hackers are able to personalize emails containing malicious files or links. If you receive a phishing email that is addressed “Dear Customer” or “To our Registered Clients,” you are less likely to be fooled than by a duplicitous email …

28
Aug

How Long Should You Retain Email?

If you Google this question, you will find some very thoughtful responses. As for me, I try to determine the value of each email immediately after having read it, deciding whether to delete or keep it. At the end of the day, I like to focus on the emails that came in that day and …

30
Jul

GDPR and Its Effects on Business Owners

As a professional services business owner who provides IT services to organizations in Rhode Island, Massachusetts, and Connecticut, I never expected that I would spend 40-50 hours becoming intimately acquainted with a new law passed by the European Union. But that’s exactly what I have done since the rollout of the General Data Protection Regulation …

28
Jun

Go Phish

Phishing and spear phishing continue to be lucrative enterprises for hackers. An effective strategy to prevent these attacks is a layered security approach with technical layers like hardened firewall configurations, anti-virus software, and email and web content filtering solutions. Fortunately, legitimate technology developers and support organizations are continuing to develop great technology tools to help …

11
May

Why Investing in Your Users Pays Dividends

Information Technology professionals have long heard the expression that the “best way to secure a computer is to pull the plug.” Barring the benefits to your electric bill, let’s face it – that is not a practical solution. Computer viruses, which pose the biggest challenge with information security, have been around for a long time. …

16
Apr

Is Your IT Partner a Passive Player or a Proactive Leader?

Several years ago, after providing a check to a merchant for a service I received, the clerk handed the check back to me attached to my receipt. It was marked ‘void.’ During a subsequent conversation with my banker, he explained the process, mentioned that check scanning was available through them and asked if I was …

10
Mar

Buyer Beware: There is no universal standard for the “Managed Service Program”

In our industry, ad-hoc network support services have become obsolete in favor of a more pro-active, managed approach to network support and security. This evolution occurred due to the growing frequency and increasingly sophisticated attacks to our data networks. Many organizations are now offering “managed service programs” (MSPs). Unfortunately, if you’ve seen one managed service …

20
Nov

Automating Processes. Securing Data.

“Tastes great! Less filling!” That 1987 advertising campaign condensed the advantages of Miller Lite beer down to four short words. If I had to choose just four words to define the advantages of Information Technology (IT), I’d say “Automating Processes. Securing Data.” With all of the talk about hacking and data breaches, data security is …

19
Oct

Business Outsourcing: Hurting or Helping Business Growth?

In the October 6-12, 2017 issue of the Providence Business News, Eli Sherman wrote a well-researched piece on outsourcing titled “Outsourcing helps keep businesses competitive, but is it hurting job growth?” Let’s explore that question. A business has two options when it comes to staffing its company: either hire the talent with W-2 employees or contract with a firm that …