Image by Michael Giuffrida about firewalls

What is next generation endpoint protection?

Once malicious content became a “thing”, antivirus software for your computer or endpoint became a necessary investment.  Then viruses evolved to “malware”, and you needed to add anti-malware to your endpoints.  Now as hackers continuously modernize, improve and evolve their attack methodologies it requires an even higher level of protection to avoid having your computer Read more about What is next generation endpoint protection?[…]

Image by Michael Giuffrida for Computer security

To be safer, take a layered approach to network security

Network security is a topic that never seems to “get old” as there are new threats and stories we hear every day in the news and from local businesses about a breach or other security challenge that we need to be vigilant about.  Threats are everywhere, even in places that we might not consider such Read more about To be safer, take a layered approach to network security[…]

Image by Michael Giuffrida for Computer security

Do I need a written information security policy for my business?

A written information security policy (WISP) is a document that a business can use to inform employees about ways to protect the information in their business.  It covers topics such as how complex passwords must be, how often they should change and how to store them.  It should also define the different types of information Read more about Do I need a written information security policy for my business?[…]

Image by Michael Giuffrida for Computer security

How do I control where my employees go on the internet?

There are different reasons for a business owner to want to control where employees go on the internet when they are at work.  First off, you might want to make sure the way employees are spending their time is on business activities not personal ones.  To achieve this, you would have to restrict websites that Read more about How do I control where my employees go on the internet?[…]

Image by Michael Giuffrida about Implementation

6 Questions to ask when deciding how to backup your data

Most businesses know that its important to backup your company’s data, but there are a lot of different strategies for doing so.  How do you know if you have done enough to ensure you will not lose any data in the event of a disaster?  A good rule of thumb for data backup is called Read more about 6 Questions to ask when deciding how to backup your data[…]

Image by Michael Giuffrida for Computer security

What is the biggest security risk in my network?

The biggest risk in any network is human behavior.  Users on your network bring most of the viruses and malware into your network through their actions while performing their jobs or simply using your technology.  Whether they are researching something on the web, reading email, or loading a program on their computer, introducing malicious code Read more about What is the biggest security risk in my network?[…]

Image by Michael Giuffrida about firewalls

What is a next generation firewall?

Anyone with a network, business or home, should have a firewall.  A firewall is a device which is plugged in between your network and the internet and works to protect your you from malicious viruses and people who attempt to gain access to your network.  To be clear, this is NOT the device that your Read more about What is a next generation firewall?[…]

Image by Michael Giuffrida for Computer security

What is ransomware and do I need to be concerned about it?

As a parent, one of the most moving lines I have ever heard from a movie was Mel Gibson in the movie Ransom when he was talking to the kidnappers and he screamed “Give me back my son!”.  He was clearly scared, angry, emotional and felt completely helpless. While the stakes are not the same Read more about What is ransomware and do I need to be concerned about it?[…]

Image by Michael Giuffrida for Computer security

How do I keep track of all my passwords?

Passwords are important, I don’t think anyone would dispute that. And in today’s day and age, most sites are requiring that passwords are “complex”. A complex password is one that has multiple nuances to it making it harder to crack by a hacker.  Examples of those nuances are upper case letters, numbers and special characters.  Read more about How do I keep track of all my passwords?[…]

Image by Michael Giuffrida for Computer security

What is two factor authentication?

When performing secure types of functions on the web such as changing passwords or logging in from a new computer, many sites and applications are now asking you for additional information such as your cell phone number to help ensure that is actually you who is logging in.  When you do this, they will send Read more about What is two factor authentication?[…]