Can you not decide what sites to block?
Many organizations fail to implement web-blocking technologies because of the arguments that erupt around what is and what is not inappropriate content to block from employees on the job. Keep in mind that most web blocking tools block by category such as, “gambling sites” and “news sites.” This frustration and confusion causes the organization to […]Continue Reading
Avoid a major pitfall of outsourcing your IT services
Most organizations outsource IT at least some of the time, and some outsource 100% of their work. When your organization outsources the IT support, without the appropriate checks and balances, the tactic of “put out the IT fires but don’t prevent the fires” can get out of control. Look at the vicious cycle below:Continue Reading
When will people learn to scramble laptop data?
Once again, I have met a new client that suffered a data breach because they lost a laptop. The news is filled with examples of this information. First of all, why are customer names, Social Security numbers, addresses, and phone numbers allowed to be stored on computers? Frequently it is without the company’s knowledge. The […]Continue Reading
Executives and Owners – ANSI recently published an action guide about 50 Questions Every C-level Executive Should Ask about Cyber Risk!
In the past, CFO’s and executives were just in charge of managing people and money. Now Cyber-Security falls into this realm as well. Too many executives just hand-off IT security to the IT department and the IT department is too busy taking care of other tasks to plug the security leaks. The American National Standards […]Continue Reading
Are You Prepared for an IT Security Breach?
In 2006, the FBI partnered with 313 companies who agreed to be in a study about IT security. The companies came from various sectors, such as medical, education, transportation, manufacturing, and many more. Combined, these companies lost over $52 million due to various types of security breaches, including viruses, theft of proprietary information, network abuse, […]Continue Reading