blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

What Is a Business Continuity Plan and Why Is It Important?

Chris Vilim
A business continuity and disaster recovery plan — also called an IT service continuity plan — is a company document that outlines what should be done in the event of a “disaster”. This includes everything from natural disasters, like floods and fires, to server outages or security breaches and more. Every business’s continuity plan looks different, but most start with the following components:
Read More
Topics: Data Breach, Owners & Managers, Network Security

A New First Line of Defense: Umbrella DNS Filtering

Alyssa Sisco
When thinking about cyber security threats, does it ever concern you how many threats are sitting out there, just on the other side of your firewall? What if we told you that your business could expand that cyber security shield further out — away from your internal network? The more space placed between your data and bad actors, and the more chances your security applications have to spot and stop malicious code before it acts, the better. That’s why we’re excited to offer Cisco Umbrella DNS ...
Read More
Topics: Cloud, Trends, Network Security

The Importance of Mobile Device Security

Alyssa Sisco
One of your sales reps just made it back to the office after a morning jam-packed with meetings. While speaking with his manager about all the conversations he had with current and potential clients, he realizes that he has no idea where his tablet went…. He knows he had it at stops one and two, but after that, he can’t recall if he used his tablet or his smartphone. Now, beyond the monetary expense of the tablet itself and the time spent configuring the proper applications, the most concerning ...
Read More
Topics: Data Breach, Trends, Network Security

6 Reasons a Firewall is an Essential Part of Your Business’s Cyber Security

Joel Havenridge
In today’s world, you can never be too careful with your organization’s cyber security. And if your employees are accessing the internet, a firewall needs to be a key part of your cyber security strategy. Firewall tools are not only useful for securing digital assets and protecting hardware, but can also be used to block employees from accessing prohibited sites and to filter web traffic. Certain firewall configurations can even tip you off if a data breach or intrusion occurs, which means you ...
Read More
Topics: Security Threats, Network Security

Aligning Cyber Security with your Business Strategy

Alyssa Sisco
Since digital transformation has taken the business world by storm, many business owners remain uncertain on how to integrate cyber security with their business strategy and daily workflows. First, it’s important for business owners to understand that security is not simply a process performed in the background, but when it's ingrained with business processes, it enables your business to thrive. So, how do you get cyber security and business strategy to align and work cohesively?
Read More
Topics: Owners & Managers, Network Security

How much information is on your IoT devices?

Joel Havenridge
You wouldn’t throw your financial paperwork in the trash without shredding it - or at least, you shouldn’t. Because you know that if someone got a hold of that information, they could potentially steal your money. But what about your IoT devices? Are you as careful when disposing of them? How much information is on smart devices you’ve connected in your home? When it comes time to get rid of them, there may be enough information left on them to open your home to someone trying to steal your ...
Read More
Topics: Security Threats, Network Security

Do external devices have access to your business's internal network?

Alyssa Sisco
Any infected device that is connected to your internal network has the potential to infect all the other devices on that network. Last week, a third-party vendor brought in a device that when connected to CHI Health’s network, introduced malware to their system. The virus spread to different devices at some of their hospitals and clinics and affected browsers attempting to connect with the health system’s network.
Read More
Topics: Security Threats, Network Security

Do you know if your CEO’s email username and password are being sold on the dark web right now?

Alyssa Sisco
Do you know if your CEO’s email username and password are being sold on the dark web right now? How would you? Eventually, you’ll find out when you have to prevent finance from wiring a hacker - posing as your CEO - large sums of money. Or, you may find out after finance has already fallen for a CEO fraud phishing scam and wired a hacker money… But if there is a way for you to know when your CEO’s credentials are being sold in the first place, you can stop the scam before it even starts. Well, ...
Read More
Topics: Security Threats, Data Breach, Network Security

What we can learn about cybersecurity from the government shutdown

Alyssa Sisco
Amid the current government shutdown, over 80 government websites are either down or insecure. With no IT staff around to renew their TLS (Transport Layer Security) certificates, many government websites are being left open to vulnerabilities. Some of the sites are set up so that they become inaccessible to the public if their TLS certificates are not up-to-date. Yet, others simply warn users that the site is not secure, then allows you to bypass the warning and continue onto the site. Once on ...
Read More
Topics: Owners & Managers, Network Security

Keeping your systems safe with Duo multifactor authentication

Tim Albertus
With today’s cutting-edge cybercriminals, it's always better to be safe rather than sorry. Hackers have been getting sneakier when it comes to gaining access to one’s system. They not only use brute force attacks or dictionary attacks but also search social media profiles for information you would be likely to use as a password (it is unwise to use personal information as part of your passwords). This is where a secondary authentication method comes into play. Dual authentication, or ...
Read More
Topics: Network Security