Image by Michael Giuffrida for Computer security

What are some mobile device management practices that I should use for my business?

The use of mobile devices in business continues to rise as employees are expected to be productive at any time wherever they happen to be.  This presents a particularly large challenge for businesses that are subject to compliance standards such as HIPPA as lost data can mean heavy duty fines and reputation killing exposure.  So Read more about What are some mobile device management practices that I should use for my business?[…]

Image by Michael Giuffrida about Teams

How does company culture play into defending and recovering from cyber attacks?

Defense in depth using multiple layers of security technology is critical in protecting your organization from cyber attacks.  That’s a given.  However many CEOs and business owners still have trouble understanding how company culture can play just as big a role in your cyber survival.  The common belief in most organizations is that they will Read more about How does company culture play into defending and recovering from cyber attacks?[…]

Image by Michael Giuffrida for Computer security

Do I need to worry about my employees having company email on their personal mobile phones?

Email has become a critical part of business communications.  As such, employees are expected to respond to email in real time, all hours of the day.  The most convenient way to implement that is to setup their work email on the personal mobile device so it is right there when they need it.  The question Read more about Do I need to worry about my employees having company email on their personal mobile phones?[…]

Image for Improvement by Michael Giuffrida

How does technology drive culture?

Technology in business has been a given for may decades however over the years it has transformed from being an unwanted evil to a necessity for survival.  One challenge is that human willingness to accept and adapt to change is greatly outpaced by innovation in technology.  This can either drive an innovative and open culture Read more about How does technology drive culture?[…]

Image for leadership posts by michael giuffrida from southington ct

How do I communicate our Total Rewards Package to employees?

Total rewards is much more than salary and if you don’t recognize and publicize that, there is no way that your employee ever will.  The total rewards packages can include: Salary Paid time off (Vacation, personal time, paid holidays, floating holidays) Flex time opportunities Insurance benefits Work/Life balance Recognition programs Quality performance management Career growth Read more about How do I communicate our Total Rewards Package to employees?[…]

Image by Michael Giuffrida about strategy

What is penetration testing and why is it important?

With businesses today having to abide by one or more compliance standards such as NIST, PCI or HiPPA, the question about penetration testing often arises.  Many compliance standards require that you perform a penetration test at least annually, but very little additional information is provided about what that means. To begin, there is a difference Read more about What is penetration testing and why is it important?[…]

Image by Michael Giuffrida about strategy

Why are so many small businesses consolidating these days?

Merger and acquisition activity in the small business space seems to be at an all time high.  Many organizations are looking to buy or be bought.  But why? From the organizations we have worked with, there are a few major drivers of this trend. Consolidation can lead to economies of scale By growing the top Read more about Why are so many small businesses consolidating these days?[…]

Image by Michael Giuffrida about solutions

What do I need to know about the recently released Connecticut cyber security strategy?

Connecticut Governor Dannel Malloy recently released his strategy for protecting the state from cyber security attacks.  The strategy document discusses steps that the government should to take in order to be prepared for an attack and how to mitigate some of the damage that could be done by one when it happens.  He also looks Read more about What do I need to know about the recently released Connecticut cyber security strategy?[…]

Image for teamwork by Michael Giuffrida

Is it OK to change the subject line in an email conversation after it is started?

Since email is not only used for communication but also for documentation, the subject line of an email is an important piece of the puzzle when filing and searching for information.  Often times, an email chain starts as one thing but morphs into something completely different once it gets rolling.  While I don’t usually recommend Read more about Is it OK to change the subject line in an email conversation after it is started?[…]

Image by Michael Giuffrida for Computer security

Is cyber liability insurance necessary for my business?

The latest statistics show that 43% of cyber attacks target small businesses and 60% of those organizations attacked go out of business within 6 months of the attack.  With the growing number of cyber attacks every day, the general thinking is not if you will will get breached, but when and how bad will it Read more about Is cyber liability insurance necessary for my business?[…]