Minimize Risk with Effective Cyber-Security Training

By |2020-06-01T10:13:03-04:00September 3rd, 2019|Safety and Cyber Security|

Effective cyber-security training tips from Dena Kamel You can (and should) install firewalls and antivirus, define email filters and policies and even deploy advanced threat detection. But if you fail to fully address human error, you have missed the most vulnerable aspect of information security. The solution lies in delivering effective cyber-security training, a goal that can prove difficult to achieve. Employees inadvertently create security problems by using weak passwords, clicking malicious links, failing to properly delete data and ignoring other basic rules of data protection. Providing ongoing, engaging and pertinent training can potentially save your organization millions of dollars

Comments Off on Minimize Risk with Effective Cyber-Security Training

Microsoft Active Directory Management to Control Access and Boost Security

By |2020-05-22T05:00:05-04:00July 23rd, 2019|Safety and Cyber Security|

Active Directory management tips from Ross Phillips A small to medium-sized business may include hundreds of employees and thousands of devices. Microsoft Active Directory (AD) provides an indispensable method for identifying those resources and managing access within the system. In organizations with data in the cloud, Azure AD provides a similar service for cloud-based servers and applications such as Office 365 for business. Active Directory and Azure AD form the core of an organization’s information technology (IT) environment. Tapping into the full capabilities of these tools requires Windows PowerShell, a command-line shell and scripting environment. While PowerShell is essential to

Comments Off on Microsoft Active Directory Management to Control Access and Boost Security

Safeguard Vital Assets with Mobile Workforce Security

By |2020-05-22T03:44:32-04:00July 18th, 2019|Office 365 and Migration, Safety and Cyber Security|

Mobile workforce security demands our attention. With a myriad of advantages for both employees and the companies they work for, it should come as no surprise that forecasters predict that by 2023, mobile workers will account for over 43 percent of the global workforce. Employees gain the flexibility of working from anywhere at any time. Businesses also benefit from increased productivity and decreased response times. At the same time, the mobile environment opens the door for increasing cyber-attacks. For instance, a hacker who gains access to an employee phone can potentially reach sensitive data inside the enterprise network. Organizations therefore

Comments Off on Safeguard Vital Assets with Mobile Workforce Security

4 Essential Steps to Cloud Computing Security

By |2020-05-13T08:51:48-04:00April 10th, 2019|Safety and Cyber Security|

Tips for cloud computing security from Greg Smith Congratulations! Your organization made the leap to the cloud. Employees from multiple offices are collaborating with ease. Your data is safe from fires and floods. And with reduced need to maintain costly data centers, you have adjusted your IT budget to explore new areas of innovation. But before you celebrate, be sure you have addressed cloud computing security. The collaborative benefits of the cloud also bring significant risks. Without specific controls, sensitive business and customer data may make its way into unauthorized hands, risking both intellectual assets and organizational image. Make cloud

Comments Off on 4 Essential Steps to Cloud Computing Security

Defense in Depth Strategy Secures Vital Information Assets

By |2020-04-30T01:02:48-04:00March 28th, 2019|Safety and Cyber Security|

Defense in Depth security tips from Ross Phillips From proprietary formulas to customer data, information is the life blood of an organization. Keeping that information secure in an age of ever-evolving cyber-threats can present a challenge. Maintaining multi-layer security, or defense in depth, must become a strategic priority for any organization. Start with prevention. The majority of cyber-security attacks would never occur if organizations kept current on patches. Add in regular security audits and a comprehensive defense in depth strategy that includes physical, technical and administrative controls. For smaller organizations, take advantage of security options provided with Office 365. Patch

Comments Off on Defense in Depth Strategy Secures Vital Information Assets
Go to Top