Education drives security apoption There is a plethora of articles on security adoption and the end user. Security companies have coined terms such as Human Firewall to stress the importance of vigilance of security in your company. But, it seems that there remains in a disconnect in how important cybersecurity is. We must bridge the…Continue Reading “Four Steps For Better Security Adoption”
What’s in a name (header) About once a week I receive a question from a user asking why their email did not deliver, often they think there is something wrong with our server. With a little bit of knowledge transfer, a user should be able to identify the reason for themselves. However, most are intimated…Continue Reading “Email Bouncebacks Demystified”
Why We Must Protect Our Privacy We have reached an inflection point in our use of technology and how we view our privacy. Privacy laws have receded in the States while becoming more stringent in the EU. This is a byproduct of culture, with Americans being more lax about privacy than our European counterparts. Security and privacy…Continue Reading “Privacy Laws Must be Enacted”
The Disconnect Between Privacy and Security Anyone who has worked as a system administrator or IT in general has had a user express concern whether they can read their email, see their location, or see photos and texts. This concern reaches a crescendo when an MDM/EMM solution is on the horizon or an employee reprimanded…Continue Reading “Tug of War: Privacy and Security”
Why Updates Matter, and Why Users Don’t Care Every IT professional knows the importance of installing software, and Operating System (OS) updates. It is so common that Microsoft’s monthly releases are Patch Tuesday. Although minor updates occur throughout the month. Given the importance of updates it is surprising to see so few users install them….Continue Reading “The Updates Paradox”
Your services and applications are critical to your ops. Make sure you have the keys. Companies use a multitude of vendors to manage digital assets. These assets range from infrastructure products to web content and curation. Somehow, companies that prize confidentiality of data are cavalier about control of these assets. Make sure you secure your applications…Continue Reading “Secure your applications and services”
Perhaps on one of the biggest misconceptions about technology use is that anyone born after 1990 is well versed with technology. While true that this generation has been exposed to technology longer, and uses it daily, it is not true that they necessarily understand how it works or leverage it to the best of their…Continue Reading “User Education is Critical”
A Bad Choice In a MSP Can Cost You More In the Long Run Managed Service Providers are a common, and necessary relationship to have in today’s market if you run a small to medium sized business. There is not enough budget to hire a full-time IT department of system administrators, network administrators nor the expertise to…Continue Reading “Five things to consider when choosing a MSP”
Why we are all responsible for security, and preventing DDOS Today, we saw a widespread DDOS attack, introducing many to such an attack for the first time. Most gamers recognize such attacks on release days for Playstation Network or Xbox Live, but the average internet consumer is unaware that such attacks occur. You may recall…Continue Reading “DDOS Attack Highlights Our Vulnerability”
You have boarded your flight home, musing through your tablet or book, waiting to take off. You noticed that the flight crew has finalized their check of the cabin, but you sit at the gate motionless. Three minutes, five minutes pass and you leave the gate and taxi down the runway before stopping. Five minutes,…Continue Reading “How imperfect information affects customers”