April, 2013

Junk Email

In today’s world of constant communication, we receive many emails per day.  Much of these emails are junk mail and spam.  According to Websense, “only 1 in 5 emails sent was legitimate, spam has increased to 76 percent of email traffic.  Phishing threats delivered via email has also increased”.  There are several ways that you […]
Read more

How secure are you?

In keeping with the theme of security, it is important to take as many steps as possible in order to keep your business and information safe.  According to Websense, “the web became significantly more malicious in 2012, both as an attack vector and as the primary support element of other attack trajectories (e.g., social, mobile, […]
Read more

Do your Passwords keep you Safe?

Keeping your information secure using difficult passwords is a great way to ensure your information will not get into the hands of the wrong people.  According to BBC News, WordPress is one of the latest websites to have a security breach.  “Wordpress has been attacked by a botnet of ‘tens of thousands’ of individual computers […]
Read more

Your Security when Storing Valuable Data

Your security is of the utmost importance when you are storing valuable data on your computers and servers.  It is important to take every step necessary to ensure that your information remains safe and unable to be hacked.  According to Tech Republic, “from this year’s Black Hat EU, I came across a briefing note titled […]
Read more

Disposing of Old Equipment

In keeping with the topic of properly disposing of old equipment, one step that you can take to ensure that you have removed everything from the devices you are disposing of is to create a list of what you have and what information is stored on those machines.  According to Tech Republic, “Track the physical […]
Read more

Disposing of Equipment in a Timely Manner

In keeping with yesterday’s blog post about security, disposing of old equipment should be done in a timely manner.  According to Tech Republic, “Don’t store equipment in need of secure decommissioning. Make it a priority to get it done, so the equipment doesn’t end up being neglected for weeks, months, or years, until someone gets […]
Read more

Tips for your Security

When disposing of old equipment, it is necessary to get rid of any valuable information that could harm your company if put into the wrong hands upon disposal.  According to Tech Republic, “Establish clear guidelines for who should have access to any equipment in need of secure disposal and track a “chain of custody” so […]
Read more

Old Equipment and your Security

When disposing of old equipment it is important to protect yourself from any possible security breach.  According to Tech Republic, one thing that you should do in order to protect yourself is to “eliminate access”.  “Ensure that you eliminate any accounts or other access control facilities that are associated with the decommissioned equipment. You don’t […]
Read more

Support and Monitoring for your Network

When it comes to your business, it is extremely valuable to have someone to monitor and support your network if and when something goes wrong.  Many times, new devices are added to your network and it is important to ensure that everything will work properly together.  According to Enterprise Management Associates, “adding new devices or […]
Read more

Are you in need of a new server?

Have you ever upgraded your server before?  According to Tech Republic, “for years, data centers benefited from the largess of Moore’s law, with each upgrade demanding the latest enterprise-grade processors, and the explosion of multi-core chips and new fabrication technologies packing unfathomable levels of processing horsepower into each new generation of processors.  However, powering and [...]
Read more