Image by Michael Giuffrida about solutions

Mike Giuffrida: You May Want Cybersecurity Liability Insurance

Your daily agenda as a business owner may involve supervising employees, completing payroll, and even facilitating training. But what about protecting your information? If you neglect this important task, you may end up going out of business sooner than you think, which means all of the other tasks you’ve been doing up to this point Read more about Mike Giuffrida: You May Want Cybersecurity Liability Insurance[…]

Image by Michael Giuffrida about solutions

Michael Giuffrida: How to Protect Your CT Business from Hackers

Last year, Dannel Malloy, the governor of Connecticut, introduced a new strategy for safeguarding the state against cybersecurity attacks. If you’re a business owner in the Constitution State, this relatively new cybersecurity strategy definitely impacts your daily operations, according to business guru Michael Giuffrida. Here’s a look at what you should know about Connecticut’s newest Read more about Michael Giuffrida: How to Protect Your CT Business from Hackers[…]

Image by Michael Giuffrida about solutions

Michael Giuffrida: Are Public Wireless Networks Truly Safe?

Being able to connect to the internet just about anywhere nowadays is both a blessing and curse. The blessing? You can remain connected and thus stay productive throughout the day. The curse? The information you send or receive in email is vulnerable to hackers. In other words, a public wireless network is a double-edged sword, Read more about Michael Giuffrida: Are Public Wireless Networks Truly Safe?[…]

Image by Michael Giuffrida about solutions

Michael Giuffrida: Cyber Espionage is a Real Threat to Small Businesses

You own a small business, so naturally, hackers will be more apt to bypass you and move on to a larger target, right? Wrong. Research shows that a third of all United States espionage attacks in cyber space target small businesses, according to entrepreneur Michael Giuffrida. Sure, a single small business’s information may not seem Read more about Michael Giuffrida: Cyber Espionage is a Real Threat to Small Businesses[…]

Image by Michael Giuffrida about marketing

What is inbound marketing and how can I use it for my organization?

With the number of options available to consumers today, many of the traditional marketing techniques get filtered out as “white noise”.  Because of this and the importance of the web, many businesses are using newer techniques called “inbound marketing” to achieve their lead generation goals. The basic concept behind inbound marketing is that you draw Read more about What is inbound marketing and how can I use it for my organization?[…]

Image by Michael Giuffrida about firewalls

What is next generation endpoint protection?

Once malicious content became a “thing”, antivirus software for your computer or endpoint became a necessary investment.  Then viruses evolved to “malware”, and you needed to add anti-malware to your endpoints.  Now as hackers continuously modernize, improve and evolve their attack methodologies it requires an even higher level of protection to avoid having your computer Read more about What is next generation endpoint protection?[…]

Image by Michael Giuffrida about progress

Do I need a server in my office anymore?

Cloud! Cloud! Cloud!  It’s the buzz word of the times but is it really right for my business?  Let’s start by defining it. In short, when something is “in the cloud” it is simply on a server which is sitting somewhere else as opposed to in your office, and it is accessed over the internet. Read more about Do I need a server in my office anymore?[…]

Image by Michael Giuffrida for Computer security

What are some mobile device management practices that I should use for my business?

The use of mobile devices in business continues to rise as employees are expected to be productive at any time wherever they happen to be.  This presents a particularly large challenge for businesses that are subject to compliance standards such as HIPPA as lost data can mean heavy duty fines and reputation killing exposure.  So Read more about What are some mobile device management practices that I should use for my business?[…]

Image by Michael Giuffrida about Teams

How does company culture play into defending and recovering from cyber attacks?

Defense in depth using multiple layers of security technology is critical in protecting your organization from cyber attacks.  That’s a given.  However many CEOs and business owners still have trouble understanding how company culture can play just as big a role in your cyber survival.  The common belief in most organizations is that they will Read more about How does company culture play into defending and recovering from cyber attacks?[…]

Image by Michael Giuffrida for Computer security

Do I need to worry about my employees having company email on their personal mobile phones?

Email has become a critical part of business communications.  As such, employees are expected to respond to email in real time, all hours of the day.  The most convenient way to implement that is to setup their work email on the personal mobile device so it is right there when they need it.  The question Read more about Do I need to worry about my employees having company email on their personal mobile phones?[…]