It is Heaven! Using the Cloud to Challenge Big Business

It is Heaven! Using the Cloud to Challenge Big Business Has anyone suggested you begin moving your business to the cloud? Cloud data storage or cloud computing? What is this, anyway? And isn't it something for huge companies? In the last...

Continue reading →

Smaller firms less likely to keep up to date on the basics that protect them

Smaller firms less likely to keep up to date on the basics that protect them.On the never ending problem of cyber security, small firms often do not have any/much in-house IT support. As a consequence, they may be...

Continue reading →

Cyberattacks and the vulnerability of the small business

Cyberattacks and the vulnerability of the small businessYou cannot go a day without reading about some big name company or even government agency being hacked and critical data being compromised. What you don’t see in the media is that...

Continue reading →

Denial is not a solution: Something you owe your customers and your employees

Denial is not a solution: Something you owe your customers and your employeesWhy do so many people procrastinate about making a will? Why is it so hard to get young people to buy health insurance? Because it is one...

Continue reading →

Limited investment capital and planning for trouble

Limited investment capital and planning for troubleSmall businesses often fail to take the time to make business continuity plans. One aspect of a business continuity plan involves developing plans to handle the loss of physical infrastructure and hardware....

Continue reading →

Data Protection Laws and PIIs

Data Protection Laws and PIIsLast week we discussed the overall concept of “Data Protection Laws,” which govern the handling and securing of specific data. While these laws are wide ranging, most of these laws reference Personally Identifiable Information (PII)...

Continue reading →

Are you subject to Data Protection laws?

Are you subject to Data Protection laws?This blog introduces a new topic that many may be unaware of: Data Protection laws. These are laws that define fully, or in part, what type of data is covered by government regulations,...

Continue reading →

Ransomware Part II

Ransomware Part IIIn our last blog, we explained what ransomware is, and why it can be an especially troublesome virus. Today, let’s look at what you can do to avoid falling victim.Prevention is the best cure. Follow standard “data...

Continue reading →

Ransomware part I

Ransomware part IThe daily reports of cybercrime are important reminders about the need to protect your business from malicious behavior that could threaten the success of your business. There are so many different things that can attack your computer,...

Continue reading →

The Cloud: Are there security issues

The Cloud: Are there security issues?For many, the idea of offloading their data to another physical/virtual location can seem like a security risk. It seems counter intuitive that moving data away from “ home” is safer. But is that...

Continue reading →