Home > News & Updates

5 Ways to Minimize Your End-User Cyber Security Risks

Mar 7, 2017 4:39:00 PM

The employee end user remains the most powerful cyber security risk in an IT system. No matter what defenses are integrated into a network, people are not 100 percent compliant like a piece of software code. Even if they are not intentionally trying to compromise a system, people can unwittingly open up a door and let in problems. That’s why IT security has to keep a constant eye and attention on the end user as as a cyber security risk.

Read More

4 Most Overlooked Cyber Security Issues and Risks

Mar 3, 2017 2:38:00 PM

The question of whether a business will be hit with cyber security issues is no longer in play. Given the frequency and capability of hacks, the question is now a matter of when. However, in most cases the event is unlikely to be a direct external hit. In fact, many events will occur because the business or organization overlooked a particular risk through a lack of awareness, sloppiness, or internal IT policy violation. Here are four of the most overlooked cyber security issues:

Read More

How to Start Planning Your Company’s Hardware Refresh Cycle

Feb 28, 2017 11:00:00 AM
Automotive service centers encourage you to change your car’s oil every 3,000 miles, though car makers say 5,000 miles is often enough. Your IT department faces a similar challenge, with many technology dealers claiming a three- to five-year hardware refresh cycle is the only way to keep your company’s servers up to date. Yet many IT C-suite executives face the nagging doubt that such a rapid refresh cycle is wasting company resources. How, then, should you start to plan your own organization’s hardware refresh cycle ?

Audit First, Plan Later

Like any business building widgets, you need to know your inventory. Do a count of servers, and detail your existing hardware specifications:

Read More