Helping clients manage their technology for over 30 years.

Cybersecurity best practices:
Paying attention to these 10 basics helps prevent ransomware attacks

7 security best practices: Preventing ransomware attacks — with...  by Quest

A commitment to the seven people-focused cybersecurity best practices I reviewed in my last post will thwart many attacks. But don’t forget these 10 key cybersecurity best practices basics:
Continue reading

Staying secure in a dangerous age:
Know the threats you face

Know the threats you face by Quest

Fasten your seatbelt. I’m driving into the realm of digital security, which can turn into a rather hairy ride.

Despite its challenges, digital security deployment is what stops the hackers, malicious actors, and spies from stealing everything. So let me begin by telling you to stay vigilant, because as the use of digital technologies becomes more pervasive, so do the attempts to exploit it for nefarious purposes.
Continue reading

Keep Your Guard Up During the Holidays

Yellow sign with exclamation point

The holiday season is upon us – which means it’s also cyberattack season. Though, arguably, 2014 has turned into an entire year of the cyberattack: one study estimates 2014 will rack up an incredible 42.8 million cyberattacks worldwide. That’s more than 117,000 attacks every day!

Which leads me to the topic of firewalls. It’s been 20 years since the first firewalls were deployed to make a perimeter gateway barrier blocking unwanted IP traffic.

Since then, firewalls have evolved to keep pace with new technologies, the ever-increasing complexities of network infrastructures and applications, and new business models that have spawned things like cloud computing and mobile apps. These days, companies deploying firewalls and advanced perimeter controls see a 15% return-on-investment. Continue reading