Image by Michael Giuffrida about solutions

Michael Giuffrida: How to Protect Your CT Business from Hackers

Last year, Dannel Malloy, the governor of Connecticut, introduced a new strategy for safeguarding the state against cybersecurity attacks. If you’re a business owner in the Constitution State, this relatively new cybersecurity strategy definitely impacts your daily operations, according to business guru Michael Giuffrida. Here’s a look at what you should know about Connecticut’s newest Read more about Michael Giuffrida: How to Protect Your CT Business from Hackers[…]

Image by Michael Giuffrida about solutions

Michael Giuffrida: Are Public Wireless Networks Truly Safe?

Being able to connect to the internet just about anywhere nowadays is both a blessing and curse. The blessing? You can remain connected and thus stay productive throughout the day. The curse? The information you send or receive in email is vulnerable to hackers. In other words, a public wireless network is a double-edged sword, Read more about Michael Giuffrida: Are Public Wireless Networks Truly Safe?[…]

Image by Michael Giuffrida about solutions

Michael Giuffrida: Cyber Espionage is a Real Threat to Small Businesses

You own a small business, so naturally, hackers will be more apt to bypass you and move on to a larger target, right? Wrong. Research shows that a third of all United States espionage attacks in cyber space target small businesses, according to entrepreneur Michael Giuffrida. Sure, a single small business’s information may not seem Read more about Michael Giuffrida: Cyber Espionage is a Real Threat to Small Businesses[…]

Image by Michael Giuffrida about firewalls

What is next generation endpoint protection?

Once malicious content became a “thing”, antivirus software for your computer or endpoint became a necessary investment.  Then viruses evolved to “malware”, and you needed to add anti-malware to your endpoints.  Now as hackers continuously modernize, improve and evolve their attack methodologies it requires an even higher level of protection to avoid having your computer Read more about What is next generation endpoint protection?[…]

Image by Michael Giuffrida for Computer security

What are some mobile device management practices that I should use for my business?

The use of mobile devices in business continues to rise as employees are expected to be productive at any time wherever they happen to be.  This presents a particularly large challenge for businesses that are subject to compliance standards such as HIPPA as lost data can mean heavy duty fines and reputation killing exposure.  So Read more about What are some mobile device management practices that I should use for my business?[…]

Image by Michael Giuffrida about Teams

How does company culture play into defending and recovering from cyber attacks?

Defense in depth using multiple layers of security technology is critical in protecting your organization from cyber attacks.  That’s a given.  However many CEOs and business owners still have trouble understanding how company culture can play just as big a role in your cyber survival.  The common belief in most organizations is that they will Read more about How does company culture play into defending and recovering from cyber attacks?[…]

Image by Michael Giuffrida for Computer security

Do I need to worry about my employees having company email on their personal mobile phones?

Email has become a critical part of business communications.  As such, employees are expected to respond to email in real time, all hours of the day.  The most convenient way to implement that is to setup their work email on the personal mobile device so it is right there when they need it.  The question Read more about Do I need to worry about my employees having company email on their personal mobile phones?[…]

Image by Michael Giuffrida about Finance

What is bitcoin and why would I need it?

With all of the cyber attacks in the news lately, you have likely heard about bitcoin.  Unless you are in the technology space, this might sound like something from a movie plot but believe it or not it is a valid form of currency around the world. Bitcoin is an electronic currency that was created Read more about What is bitcoin and why would I need it?[…]

Image by Michael Giuffrida about strategy

What is penetration testing and why is it important?

With businesses today having to abide by one or more compliance standards such as NIST, PCI or HiPPA, the question about penetration testing often arises.  Many compliance standards require that you perform a penetration test at least annually, but very little additional information is provided about what that means. To begin, there is a difference Read more about What is penetration testing and why is it important?[…]

Image by Michael Giuffrida for Computer security

Can cyber espionage affect my small-business?

Just because you are a small business owner does not mean you are a small target; in fact, about 1 in 3 of all cyber espionage attacks in the U.S. pray on small businesses. Espionage attacks are on the rise and frequently automated to target small businesses in the masses—while one business alone might not Read more about Can cyber espionage affect my small-business?[…]