Blog

Categories
Data Protection Cybersecurity - Prevention Blog

Weather Preparedness Checklist: What You Need To Know

Whether it’s a snowstorm that knocks out the power or a hurricane that brings floodwaters – bad weather can have extremely unpredictable damage that ensues because of it.

When this happens, it’s important to make sure you take proper precautionary steps to help protect your IT infrastructure and data from the potential repercussions of a storm.

Categories
Blog Data Protection Cybersecurity - Prevention

Going Passwordless in Microsoft? Here’s What You Need to Know

Passwords pose a major security risk to your organization. Even though most of us have always been taught to create complex and strong passwords, that doesn’t eliminate the threat of them getting guessed, stolen, or hacked.

As cyber criminals get more advanced in their tactics, the ways in which we protect our accounts must advance as well.

Categories
Ransomware Employee-friendly Content Data Protection Blog

Summer Series: How to Spot and Avoid Ransomware Attacks

As we begin to officially wrap up summer, our Summer Series videos are coming to an end. But, we couldn’t quite leave vacation without talking about one last topic: ransomware.

Ransomware is an extremely common tactic used by cybercriminals and can be nearly impossible to see coming. Check out the quick clip below to learn more about what ransomware is and the steps you can take to help avoid falling victim.

Categories
Blog Data Protection Cybersecurity - Prevention

Summer Series: Protecting Data on Your Mobile Devices

In this digital world, everything is now mobile. Your team accesses work on more than just their computers. While the flexibility is convenient, you have to make sure it’s being done securely so that your organization is not left vulnerable.

Categories
Webinars Data Protection Cybersecurity - Prevention Cybersecurity - Detection and Response

Cybersecurity & Compliance: Managing Risks and Keeping IT Secure
ON-DEMAND WEBINAR

Critical pieces of information created and stored by businesses must be protected. Data protection may be a legal requirement, but it’s also essential for your organization’s security.

As more technology is being used in business operations and more data is being created and stored, higher levels of regulation are required to protect personal information. IT compliance aims to hold companies accountable, and cybersecurity helps keep data secure.

Join us for a discussion as we break down regulatory compliance and effective measures to protect IT systems.

What You’ll Learn:

  • Quick overview of compliance and regulation laws that may affect your business
  • Keeping your organization on top of regulatory compliance
  • Best practices for data protection
  • The cybersecurity basics checklist

Related Links Mentioned:

  1. What is the Principle of Least Privilege?
  2. CREO’s website
  3. What is multi-factor authentication?
  4. Importance of testing your backups

Meet Our Guest:

Rett Summerville, Director at CREO

With over 17 years of experience working in technical and business roles in software, fintech, and consulting services, Rett is a seasoned IT security and risk management leader.

He promotes business-driven security and believes that good IT security practices can help companies be more competitive by enabling them to make better decisions quickly and confidently.

His passion for helping clients allows them to transform their culture to improve security awareness, gain efficiencies, and maintain compliance.

In this webinar, Rett joins us to share his wealth of knowledge on regulatory compliance and best practices for businesses as they navigate through the requirements.

Categories
Cybersecurity - Prevention Webinars Data Protection Productivity

Head in the Cloud? What You Need to Know About Cloud Technology
ON-DEMAND WEBINAR

It’s no surprise that many businesses are making the move towards a cloud environment, especially given the flexibility and scalability that it allows. However, it can seem overwhelming to know where to start when it comes to making the switch.

How can small businesses continue to be competitive by shifting towards the cloud, while also staying productive and secure?

Join us for a discussion as we break down the cloud with things to consider as you make the switch.

In this webinar, we’ll focus on strategies to help your organization better understand the options so you can adopt the right cloud technologies. With 20 years of experience working with small businesses, we’ll answer the most common questions, including:

  • Should we move our server to the cloud?
  • How do we keep secure in the cloud?
  • What does the migration to the cloud look like?

Segments
  1. Cloud Technology (starts at 1:52)
  2. Cloud Security (starts at 13:45)
  3. Cloud Migration (starts at 22:17)

Related Links Mentioned:

Marissa Explains IT All: What is the cloud?

Webinar: Sharing Files in the Cloud

Marissa Explains IT All: What is multi-factor authentication?

Blog: Easy Tips to Strengthen Password Security

Marissa Explains IT All: What is the Principle of Least Privilege?

Blog: How DNS Security Keeps Your Organization Secure

Blog: Tips for Testing Your Backups

Marissa Explains IT All: How to Choose the Right Firewall

Categories
Blog Data Protection Cybersecurity - Prevention

Marissa Explains IT All: How to Choose the Right Firewall

When it comes to selecting the right firewall for your business, there’s a few considerations to think about. Your firewall is an integral part of keeping your business secure, so you want to ensure that you have the proper one in place to do just that.

In today’s hybrid work environment, nearly everything is connected to the internet in order to allow this flexible work style. Unfortunately, if it’s connected to the internet, it’s also at risk for cyberattack.

Categories
Blog Data Protection Data Backups & Recovery

How to protect your business from disaster

Think your business is immune to disasters? Think again. Disasters can strike without warning and, when they do, your company stands to lose more than just the time and money you’ll have to spend on data recovery and compensation. You could lose years of hard-earned reputation and trust from loyal clients – the two things that could potentially put an end to your operations altogether. It’s therefore important to protect your business from disasters before they even happen. When it comes to disaster recovery planning, there are countless actions you can take to minimize damage and risk. Here are a few to help you protect your business from disaster.

Categories
Data Protection Blog

Data warehouses drive business development

As a small business owner, you’re probably looking into ways to maximize profitability and minimize costs. In order to do that you must make good business decisions, and making sound decisions requires a thorough analysis of all relevant data. That kind of data can be found in a well-designed data warehouse. Businesses have to deal with large amounts of data everyday, and this is where a data warehouse can help. If you’re wondering what exactly a data warehouse is and how your business can use it, here is some information to get you started.

Categories
Blog Data Protection

Venmo adds multi-factor authentication

It’s easy to get complacent about internet security, but the reality is that none of us can afford to let our guard down. Precautions to protect yourself, your identity and your finances online can be simple, but they are only effective when practiced rigorously and consistently. And while the most obvious things like making passwords hard to guess and locking your workstation are as effective as they ever were, nowhere are conscientious security efforts more crucial than when using online banking systems and mobile payment portals. Users of peer-to-peer payment provider Venmo can breathe a sigh of relief, then, because the service just added extra security controls for its customers.