Image by Michael Giuffrida for Computer security

Can I trust the wifi in public places?

In a business world where organizations expect you to be connected and productive at all times of all days, the convenience of having publicly available wireless networks wherever you are is fantastic!  Or is it?  The answer is, it depends. The availability of an internet connection can cut both ways.  While it can give you Read more about Can I trust the wifi in public places?[…]

Image by Michael Giuffrida about solutions

What do I need to know about the recently released Connecticut cyber security strategy?

Connecticut Governor Dannel Malloy recently released his strategy for protecting the state from cyber security attacks.  The strategy document discusses steps that the government should to take in order to be prepared for an attack and how to mitigate some of the damage that could be done by one when it happens.  He also looks Read more about What do I need to know about the recently released Connecticut cyber security strategy?[…]

Image by Michael Giuffrida for Computer security

Is cyber liability insurance necessary for my business?

The latest statistics show that 43% of cyber attacks target small businesses and 60% of those organizations attacked go out of business within 6 months of the attack.  With the growing number of cyber attacks every day, the general thinking is not if you will will get breached, but when and how bad will it Read more about Is cyber liability insurance necessary for my business?[…]

Image by Michael Giuffrida for Computer security

How do I avoid these latest cyber attacks?

With all of the press about the latest Petya attack on the heels of the WannaCry attack businesses are scrambling to figure out how they can avoid getting hit next.  The latest statistics show that 43% of cyber attacks happen against small businesses and 60% of those attacked go out of business within 6 months.  Read more about How do I avoid these latest cyber attacks?[…]

Image by Michael Giuffrida about firewalls

What is next generation endpoint protection?

Once malicious content became a “thing”, antivirus software for your computer or endpoint became a necessary investment.  Then viruses evolved to “malware”, and you needed to add anti-malware to your endpoints.  Now as hackers continuously modernize, improve and evolve their attack methodologies it requires an even higher level of protection to avoid having your computer Read more about What is next generation endpoint protection?[…]

Image by Michael Giuffrida for Computer security

To be safer, take a layered approach to network security

Network security is a topic that never seems to “get old” as there are new threats and stories we hear every day in the news and from local businesses about a breach or other security challenge that we need to be vigilant about.  Threats are everywhere, even in places that we might not consider such Read more about To be safer, take a layered approach to network security[…]

Image by Michael Giuffrida for Computer security

Do I need a written information security policy for my business?

A written information security policy (WISP) is a document that a business can use to inform employees about ways to protect the information in their business.  It covers topics such as how complex passwords must be, how often they should change and how to store them.  It should also define the different types of information Read more about Do I need a written information security policy for my business?[…]

Image by Michael Giuffrida for Computer security

How do I control where my employees go on the internet?

There are different reasons for a business owner to want to control where employees go on the internet when they are at work.  First off, you might want to make sure the way employees are spending their time is on business activities not personal ones.  To achieve this, you would have to restrict websites that Read more about How do I control where my employees go on the internet?[…]

Image by Michael Giuffrida about Implementation

6 Questions to ask when deciding how to backup your data

Most businesses know that its important to backup your company’s data, but there are a lot of different strategies for doing so.  How do you know if you have done enough to ensure you will not lose any data in the event of a disaster?  A good rule of thumb for data backup is called Read more about 6 Questions to ask when deciding how to backup your data[…]

Image by Michael Giuffrida for Computer security

What is the biggest security risk in my network?

The biggest risk in any network is human behavior.  Users on your network bring most of the viruses and malware into your network through their actions while performing their jobs or simply using your technology.  Whether they are researching something on the web, reading email, or loading a program on their computer, introducing malicious code Read more about What is the biggest security risk in my network?[…]