Category: Security

Penetration testing, also referred to as "pen testing" or "ethical hacking", is the process of testing a computer network, application or computer system to identify security issues that could be exploited by a cyber attacker. This testing is also referred to as a "white hat attack" because in a pen ... Read More
April 10, 2019Tommi
DNS hijacking, also referred to as DNS redirection, is a specific type of cyber attack, wherein a "bad actor" can redirect queries to a domain name server, by overriding TCP/IP settings often by hacking and modifying a server's settings. DNS hijacking is frequently used for phishing - displaying fake versions ... Read More
April 3, 2019Tommi
When it comes to data integrity of a business, cybersecurity can never be stressed enough. Information regarding cybersecurity has become more shared and advanced and cyber criminals are constantly looking for new ways to steal data from businesses, via attacking them online. Unfortunately, they tend to be widely successful at ... Read More
December 6, 2018Tommi
Perhaps you’re not fully convinced that your business needs a comprehensive disaster recovery plan. Maybe you feel that the risk isn’t critical enough for you to take action. Regardless of the reason for not having a comprehensive disaster recovery plan, many unprepared business owners don’t see the need, until it’s too late. If ... Read More
November 13, 2017Stacey Larson
Security is essential for many business operations. Whether you are storing customers’ credit card information or protecting your proprietary information, you need a sound business security solution strategy to meet all of your security needs without creating chinks or cracks that hackers can slip through. In a world full of sophisticated computer criminals, a ... Read More
September 18, 2017Stacey Larson
In earlier posts, we’ve discussed how Voice Over Internet Protocol (VoIP) systems can help your business flourish and provided tips to help protect and secure utility management solutions for your business. While case scenarios that can drive the consideration and implementation of VoIP security solutions can include reducing telephony costs, value-added features not available in traditional telephony solutions, and gaining the increased flexibility ... Read More
September 5, 2017Stacey Larson
There are increasing risks daily due to ever-growing exposure of data integrity to new technologies and devices. Recognizing this, IT professionals are devoting more and more resources, time, and effort to detecting, preventing and restoring from hackers who, maliciously or otherwise, seek to gain access to management systems and disrupt ... Read More
August 29, 2017Stacey Larson
Is your door lock worth more to you than the metal it is made from? Most of us would answer “yes” and be grateful for the lock. Can business security solutions deliver both peace of mind and protection while being engineered to stay in front of the newest trends and ... Read More
August 21, 2017Stacey Larson
Telecommuting is a great benefit for many businesses, especially smaller businesses who are better able to attract high-quality employees by providing their workers with the option to telecommute. Even if telecommuting isn’t part of your workforce, you may have mobile workers that use similar technologies to maintain their connection with your company. ... Read More
July 10, 2017Stacey Larson
There is a direct correlation between security solutions and productivity. The Internet is used for a lot, including reducing the amount of paperwork that slides across a desk at any given time. However, paper is still being used for a lot as well, including invoicing and reporting. Much of this has to do with ... Read More
July 5, 2017Stacey Larson
Every CEO, president, owner, and high-level manager struggles with this question – is the area under my level of concern secure against all of the threats it might face? How will my current business security system hold up if threatened? Part of the risk-reward conundrum is the realization that the resources devoted ... Read More
June 12, 2017Stacey Larson
Communication security is vital in business to protect confidential information from getting into the hands of criminals or aggressive competitors who will use it, not for your benefit. A whole technical discipline has grown up around this need. The United States Department of Defense often refers to these solutions for security ... Read More
May 19, 2017Stacey Larson
Disaster Recovery Plans Prevent Downtime & Lost Revenue Savvy business owners proactively develop a disaster recovery plan, to ensure that they have a detailed, tested and documented plan for implementing their IT recovery process, in the event of a man-made or natural disaster. A disaster is, typically, defined as any event ... Read More
June 7, 2016Tommi
Security is essential for many business operations. Whether you are storing customers' credit card information or protecting your proprietary information, you need a sound business security solution strategy to meet all of your security needs without creating chinks or cracks that hackers can slip through. In a world full of sophisticated computer ... Read More
October 16, 2015Chris Torbit
What do Premara Blue Cross, Anthem, Chick-fil-A, Sony, USPS, MCX, Staples, Kmart, Dairy Queen, SuperValue, Jimmie John's, Viator, Home Depot, PF Chang's, Community Health Systems, and JP Morgan all have in common? Each of these companies was hacked during 2014-2015. Sadly, this is just a short list showing the breadth of ... Read More
October 16, 2015Chris Torbit