Image by Michael Giuffrida for Computer security

Do I need to worry about my employees having company email on their personal mobile phones?

Email has become a critical part of business communications.  As such, employees are expected to respond to email in real time, all hours of the day.  The most convenient way to implement that is to setup their work email on the personal mobile device so it is right there when they need it.  The question Read more about Do I need to worry about my employees having company email on their personal mobile phones?[…]

Image by Michael Giuffrida about Finance

What is bitcoin and why would I need it?

With all of the cyber attacks in the news lately, you have likely heard about bitcoin.  Unless you are in the technology space, this might sound like something from a movie plot but believe it or not it is a valid form of currency around the world. Bitcoin is an electronic currency that was created Read more about What is bitcoin and why would I need it?[…]

Image by Michael Giuffrida about strategy

What is penetration testing and why is it important?

With businesses today having to abide by one or more compliance standards such as NIST, PCI or HiPPA, the question about penetration testing often arises.  Many compliance standards require that you perform a penetration test at least annually, but very little additional information is provided about what that means. To begin, there is a difference Read more about What is penetration testing and why is it important?[…]

Image by Michael Giuffrida for Computer security

Can cyber espionage affect my small-business?

Just because you are a small business owner does not mean you are a small target; in fact, about 1 in 3 of all cyber espionage attacks in the U.S. pray on small businesses. Espionage attacks are on the rise and frequently automated to target small businesses in the masses—while one business alone might not Read more about Can cyber espionage affect my small-business?[…]

Image by Michael Giuffrida for Computer security

Can I trust the wifi in public places?

In a business world where organizations expect you to be connected and productive at all times of all days, the convenience of having publicly available wireless networks wherever you are is fantastic!  Or is it?  The answer is, it depends. The availability of an internet connection can cut both ways.  While it can give you Read more about Can I trust the wifi in public places?[…]

Image by Michael Giuffrida about solutions

What do I need to know about the recently released Connecticut cyber security strategy?

Connecticut Governor Dannel Malloy recently released his strategy for protecting the state from cyber security attacks.  The strategy document discusses steps that the government should to take in order to be prepared for an attack and how to mitigate some of the damage that could be done by one when it happens.  He also looks Read more about What do I need to know about the recently released Connecticut cyber security strategy?[…]

Image by Michael Giuffrida for Computer security

Is cyber liability insurance necessary for my business?

The latest statistics show that 43% of cyber attacks target small businesses and 60% of those organizations attacked go out of business within 6 months of the attack.  With the growing number of cyber attacks every day, the general thinking is not if you will will get breached, but when and how bad will it Read more about Is cyber liability insurance necessary for my business?[…]

Image by Michael Giuffrida for Computer security

How do I avoid these latest cyber attacks?

With all of the press about the latest Petya attack on the heels of the WannaCry attack businesses are scrambling to figure out how they can avoid getting hit next.  The latest statistics show that 43% of cyber attacks happen against small businesses and 60% of those attacked go out of business within 6 months.  Read more about How do I avoid these latest cyber attacks?[…]

Image by Michael Giuffrida about firewalls

What is next generation endpoint protection?

Once malicious content became a “thing”, antivirus software for your computer or endpoint became a necessary investment.  Then viruses evolved to “malware”, and you needed to add anti-malware to your endpoints.  Now as hackers continuously modernize, improve and evolve their attack methodologies it requires an even higher level of protection to avoid having your computer Read more about What is next generation endpoint protection?[…]

Image by Michael Giuffrida for Computer security

To be safer, take a layered approach to network security

Network security is a topic that never seems to “get old” as there are new threats and stories we hear every day in the news and from local businesses about a breach or other security challenge that we need to be vigilant about.  Threats are everywhere, even in places that we might not consider such Read more about To be safer, take a layered approach to network security[…]