IT Managed Services

A blog for understanding best practices in technology

5 Ways to Protect Your Business from Hackers

Do you worry about security breaches? It seems you can't go more than a week without hearing of a major retailer or large financial institution dealing with a significant cyber attack. If companies with the biggest IT budgets are not immune, what can smaller companies do? Lots.
Read More

Should You Use One IT Provider for Both Managed Services and Security?

With ransomware events and security breaches in the headlines every day, business leaders have come to closely associate technology needs with cybersecurity. Maintaining a secure IT infrastructure for your company has become ever more difficult while at the same time critical to company profits. Creating a secure IT environment goes far beyond firewalls and anti-virus software.
Read More

SIEM Optimization: Tuning Your SIEM

You have signed the contract, installed the cabling, and configured your network devices. Syslogs are streaming into your new SIEM and alerting is operational. Finally, you can stop reviewing thousands of logs each day and move on to something a bit more interesting. (mic drop)
Read More

How to Secure Your Business from Cyber Attack

If you haven't suffered a security breach or ransomware attack recently, you may believe that your IT environment is secure, and you are successfully preventing intruders from getting in. But how do you know? Just because no one is reporting problems does not mean that malicious activity does not already exist in your environment.
Read More

Test Your Cybersecurity Knowledge

These days it seems you can’t go more than a week without hearing of a major retailer or large financial institution dealing with a significant security breach. If companies with the biggest budgets are not immune, what can smaller companies do?
Read More

Data Privacy and Securing Confidential Information

A quick triage of your emails tells you that today is not going to be a good day. There has been a data leak. Your company has lost control of its PII, PHI, CUI – take your pick. Data is up for sale on the internet and you need to figure out why.
Read More

Why We Align Our Cybersecurity Practice with the NIST Cybersecurity Framework

Companies across all industries have taken steps to protect their data and prevent cybercrime. The use of information security frameworks grew out of a need for organizations to follow a set of steps to protect information. By selecting a cybersecurity framework, companies could adopt a set of policies and procedures around the implementation and ongoing management of information security controls in an enterprise environment.
Read More

Preparing for Disasters with Disaster Recovery Services

  Looking back over the last eight months, we have seen major power outages hit the US eastern seaboard.
Read More

How Risk Management Can Improve Your Company's IT

As an IT manager, you may think of risk management as outside your purview. That's a mistake. Risk management should not be confined to the finance or accounting department at your company. Nor is it only for companies with their own risk management team led by a Chief Risk Officer to worry about.
Read More

Using Managed SIEM for Compliance

  GDPR, NIST, HIPAA, PCI... The names may change but it all comes down to control, visibility, and auditing.
Read More

Subscribe to Email Updates