Failing to Plan = Planning to Fail

Benjamin Franklin provided us with that priceless truth, which has no logical argument against it. Nothing that lasts and has value was created without a plan. ...

Are Your Backups Any Good?

How do you know if your local or cloud-based data backups are reliable? Maybe they were yesterday -but are they today? ...

How 5G Will Affect your Network

Cyber criminals tend to follow the path of least resistance. The easier it is to hurt businesses and take their money, the more businesses they can attack. ...

Protect your email in a Cybercrime World

Cyber criminals tend to follow the path of least resistance. The easier it is to hurt businesses and take their money, the more businesses they can attack. ...

How to Stay Master of Your Domain

This is not exactly what Jerry and his friends were talking about on that old ‘Seinfeld’ episode. This is about what happens when an organization loses control of their Domain Name by letting it expire. ...

Network Policies & Procedures: Do You Practice What You Preach?

Every organization has important rules. Even more importantly, they must be in writing and stringently enforced – and not on a case-by-case basis. ...

Think Twice Before Hiring an In-house IT Person

The top cyber threats that challenge businesses worldwide do not vary much from year to year. All the Usual Suspects are there, with maybe minor changes in ‘pole position.’ Usually topping the list: Phishing, Malware, Ransomware etc. ...

Beware the Insider Threat

The top cyber threats that challenge businesses worldwide do not vary much from year to year. All the Usual Suspects are there, with maybe minor changes in ‘pole position.’ Usually topping the list: Phishing, Malware, Ransomware etc. ...

Is it Time for a Dark Web Scan?

Your business survives in large part due to the data you have amassed. It’s all about your clients: Their payment processing information, the history of transactions with your company, their key contacts and decision makers: This is the life blood of your business. ...

Privacy-Enhancing Computation is a ‘MUST HAVE’

I’d imagine that any CEO would figure they already have Privacy-Enhancing Computation – at least if they a use a reasonably sophisticated IT service. ...