IT Managed Services

A blog for understanding best practices in technology

Entries related to: cybersecurity

SIEM vs. Firewall: Why do I need a SIEM if I already have a firewall?

If one of your cybersecurity New Year’s resolutions is to improve your company’s cybersecurity, you have probably considered security information and event management (SIEM) solutions. But you may be feeling overwhelmed by the costs involved and the time commitment in implementation. After all, if you already have a firewall and several other security tools in place within your IT infrastructure, why do you need a SIEM?
Read More

How are managed IT services usually priced?

Service plans for your information technology can be as unique as your business. But it can be helpful to understand the factors that impact how much you will pay for IT managed services and what is usually included in common service offerings.
Read More

How can an IT network assessment benefit my business?

We have long recommended an IT network assessment as part of onboarding with new managed IT services clients. This provides a starting baseline of the current network infrastructure. From this, we can develop a strategy that will safeguard the systems used to run the business and ensure that the network supports the goals of the business.
Read More

5 Ways to Protect Your Business from Hackers

Do you worry about security breaches? It seems you can't go more than a week without hearing of a major retailer or large financial institution dealing with a significant cyber attack. If companies with the biggest IT budgets are not immune, what can smaller companies do? Lots.
Read More

Should You Use One IT Provider for Both Managed Services and Security?

With ransomware events and security breaches in the headlines every day, business leaders have come to closely associate technology needs with cybersecurity. Maintaining a secure IT infrastructure for your company has become ever more difficult while at the same time critical to company profits. Creating a secure IT environment goes far beyond firewalls and anti-virus software.
Read More

SIEM Optimization: Tuning Your SIEM

You have signed the contract, installed the cabling, and configured your network devices. Syslogs are streaming into your new SIEM and alerting is operational. Finally, you can stop reviewing thousands of logs each day and move on to something a bit more interesting. (mic drop)
Read More

How to Secure Your Business from Cyber Attack

If you haven't suffered a security breach or ransomware attack recently, you may believe that your IT environment is secure, and you are successfully preventing intruders from getting in. But how do you know? Just because no one is reporting problems does not mean that malicious activity does not already exist in your environment.
Read More

Test Your Cybersecurity Knowledge

These days it seems you can’t go more than a week without hearing of a major retailer or large financial institution dealing with a significant security breach. If companies with the biggest budgets are not immune, what can smaller companies do?
Read More

Data Privacy and Securing Confidential Information

A quick triage of your emails tells you that today is not going to be a good day. There has been a data leak. Your company has lost control of its PII, PHI, CUI – take your pick. Data is up for sale on the internet and you need to figure out why.
Read More

Why We Align Our Cybersecurity Practice with the NIST Cybersecurity Framework

Companies across all industries have taken steps to protect their data and prevent cybercrime. The use of information security frameworks grew out of a need for organizations to follow a set of steps to protect information. By selecting a cybersecurity framework, companies could adopt a set of policies and procedures around the implementation and ongoing management of information security controls in an enterprise environment.
Read More

Subscribe to Email Updates