What's Wrong With This Picture?

April 05th, 2018

There are many layers to network security, and fortunately everyone seems to be more aware of the ongoing work required to protect digital data from hackers and the multitude of online threats we're facing. But there is another aspect to data protection that is often overlooked, and that's physical security.

Read More

The Trouble With Passwords...

August 23th, 2017

Let’s face it, coming up with complex, lengthy and truly random passwords is hard to do.  And despite all the best practices and guidelines, it seems that the hackers are still one step ahead of us, able to crack even passwords that we think follow the accepted rules.  So why is this, and what can we do about it?

Read More

Unmasking the Insider Threats Your Business is Facing

August 08th, 2017

Insider threats are very real…but the most worrisome ones aren’t necessarily what you think they are.  The fact is, the majority of inside breaches aren’t caused by malicious users, but by employee negligence.  Therefore, effectively protecting against insider threats means that you first need to understand who these “insiders” really are.

Read More

Windows 10 Sees Faster Adoption Rates Than Previous OS, Largely Due to Security Improvements

April 26th, 2017

According to the analyst firm Gartner, Windows 10 adoption rates by enterprise business are now exceeding those of Microsoft’s previous operating system (OS).  And it is the operating system’s security improvements that are being cited as the primary driver of the migration.

Read More

Security Tips for Amazon Echo

February 23th, 2017

With sales of Amazon’s personal home assistant more than double what they were just a year ago, it’s safe to say that many of us are enjoying the many features of the voice-activated (and we think, very cool) Echo.  But no technology is without risks, so we have put together some security tips for Amazon Echo that every owner should know about,...

Read More

The BIG Lie You Keep Telling Yourself...and Why It Needs to Stop

January 27th, 2017

Any of these statements about your cyber-risks sound familiar?

"That will never happen to me."

"We're not big enough to have to worry about getting hacked."

"The risk is so low, it's just not worth worrying about."

Read More

Realistic Password Security Solutions

January 17th, 2017

Realistic Password Security Solutions

Read More

Are You Practicing Safe IT Habits On-the-Go?

December 29th, 2016

Business travel – whether for just one day or multiple days – requires a fair amount of planning and pre-travel preparation.  But one important thing that often gets left off the checklist is properly preparing our devices for departure.

Read More

ICYMI - Round-up of cybersecurity information and resources

December 15th, 2016

We focused on cybersecurity and network security a lot this year (because it's just THAT important!), so in case you missed any updates, webinars, or resource downloads, we have put them all together in one post for you.  Here's to staying safe in cyberspace!

Read More

Is An Outdated Browser Leaving Your Business Network Vulnerable?

November 22th, 2016

The answer is yes. 

If you’re using an unpatched or older browser (or browsers), then yes - you are leaving your network vulnerable to cyber threats that could easily compromise your business data.

Read More
Sign Me Up for the CT Blog

Recent Posts

Categories

see all