Can Your Business Survive a Ransomware Attack?

By Roger Murray | February 14th, 2017| Network Security

When your business is hit by crypto-malware, you become keenly aware of just how little preparation and planning you have done to prevent your data from being compromised. SonicWALL reported Ransomware Attacks on businesses of all sizes reached $638 million in 2016, a considerable uptick from the $3.8 million reported in 2015. The exponential growth … Continued

Why You Should Scam Your Own Employees

By Roger Murray | February 2nd, 2017| Network Security

Identifying network vulnerabilities, as well as the right tools to address them, have become of major concern to many organizations. According to industry leaders, businesses should consider a rather unorthodox approach to educating and identifying exactly how prone they are to a data breach, scam their employees. Simulating phishing attacks provide a quantifiable insight at … Continued

Is Your Business Winter Ready?

By Roger Murray | January 20th, 2017| Backup & Disaster Recovery

Hacks and Ransomware Attacks often catch the headlines for their wide impact and compromised data.  However, for many businesses located in colder climates, a very real threat to their daily operations revolve around the worst winter weather, much of which is still ahead of us.  Inclement winter weather can lead to disruptions in your normal … Continued

How To: Guard Against HIPAA Privacy Breach Fines & Violations

By Roger Murray | January 16th, 2017| Governance & IT Compliance

In 2016, the Health Insurance Portability & Accountability Act (HIPAA) collected over 23 Million in Civil Money Penalties (CMPs) related to businesses violating patient data privacy provisions.  Over half of the cases involved organizations who failed to even have a proper risk assessment conducted. The cost for violating HIPAA privacy protections continue to grow, which … Continued

New Year New Approach to Backup & Recovery Plans

By Roger Murray | January 5th, 2017| Cloud Services

One of the essential components to any business revolves around the protection of their data.  Continuity in the event of an IT disaster, or even minor downtime, is critical.  Ensuring your business can access critical information in those moments, as well as having the ability to recover can save thousands of dollars per hour depending … Continued

Network Security: The 5 Things Every Small Business Should Know

By Roger Murray | January 3rd, 2017| Network Security

Nearly every business believes the unfortunate data breaches and attacks only happen to others; that the overall risk of an attack on your business is low.  Why would anyone care to target me? The truth is that hackers would love nothing more than to gain access to your sensitive company data.  It’s why we decided … Continued

Why Your Business Needs a WISP

By Roger Murray | December 29th, 2016| Governance & IT Compliance

Not having a written information security program (WISP) for your business could be putting your data at risk of not only theft, but substantial legal/punitive damages. The laws in Massachusetts enforce strict guidelines to safeguard any personal information of individuals stored on your network. Sadly, many SMBs brush it off as a minimal danger that … Continued

5 Things to Look for in a Managed Service Provider

By Roger Murray | December 14th, 2016| Managed Services

The role of IT in up & coming businesses often becomes an afterthought.  One day, you are a small team with a singular goal, with a lot of hard work and a bit of luck, your business begins to thrive; staff assume more and more responsibilities to keep things moving smoothly, before you know it, … Continued

An Inside Job: The Real Threat to Your Business Network’s Security

By Roger Murray | December 8th, 2016| Network Infrastructure

Today, the number of types of cyber-attacks which threaten the security of your businesses are endless.  We’ve discussed the greatest weakness in network security being users before, but the focus was in a non-acting participant being coerced into clicking on a malicious link or opening a dangerous attachment. We often focus so much attention to … Continued

What are the Benefits to Cloud Computing & IaaS?

By Roger Murray | December 7th, 2016| Cloud Services

While the reasons behind considering a cloud based network infrastructure may vary, businesses across all industries and sizes are turning to the cloud to scale their organization.  The adoption of cloud services is accelerating at a much more rapid pace than previously anticipated, with a considerable amount considering an Infrastructure-as-a-Service (IaaS) environment. But what are … Continued

Need Support? Call Us Today

Available 24 hours a day, 7 days a week
1-508-543-6979