Image by Michael Giuffrida about Implementation

6 Questions to ask when deciding how to backup your data

Most businesses know that its important to backup your company’s data, but there are a lot of different strategies for doing so.  How do you know if you have done enough to ensure you will not lose any data in the event of a disaster?  A good rule of thumb for data backup is called Read more about 6 Questions to ask when deciding how to backup your data[…]

Image by Michael Giuffrida for Computer security

What is the biggest security risk in my network?

The biggest risk in any network is human behavior.  Users on your network bring most of the viruses and malware into your network through their actions while performing their jobs or simply using your technology.  Whether they are researching something on the web, reading email, or loading a program on their computer, introducing malicious code Read more about What is the biggest security risk in my network?[…]

Image by Michael Giuffrida about firewalls

What is a next generation firewall?

Anyone with a network, business or home, should have a firewall.  A firewall is a device which is plugged in between your network and the internet and works to protect your you from malicious viruses and people who attempt to gain access to your network.  To be clear, this is NOT the device that your Read more about What is a next generation firewall?[…]

Image by Michael Giuffrida for Computer security

What is ransomware and do I need to be concerned about it?

As a parent, one of the most moving lines I have ever heard from a movie was Mel Gibson in the movie Ransom when he was talking to the kidnappers and he screamed “Give me back my son!”.  He was clearly scared, angry, emotional and felt completely helpless. While the stakes are not the same Read more about What is ransomware and do I need to be concerned about it?[…]

Image by Michael Giuffrida for Computer security

How do I keep track of all my passwords?

Passwords are important, I don’t think anyone would dispute that. And in today’s day and age, most sites are requiring that passwords are “complex”. A complex password is one that has multiple nuances to it making it harder to crack by a hacker.  Examples of those nuances are upper case letters, numbers and special characters.  Read more about How do I keep track of all my passwords?[…]

Image by Michael Giuffrida for Computer security

What is two factor authentication?

When performing secure types of functions on the web such as changing passwords or logging in from a new computer, many sites and applications are now asking you for additional information such as your cell phone number to help ensure that is actually you who is logging in.  When you do this, they will send Read more about What is two factor authentication?[…]