Category Archives: Blog
Limited investment capital and planning for trouble
Limited investment capital and planning for troubleSmall businesses often fail to take the time to make business continuity plans. One aspect of a business continuity plan involves developing plans to handle the loss of physical infrastructure and hardware. Unfortunately, smaller and younger firms
Data Protection Laws and PIIs
Data Protection Laws and PIIs Last week we discussed the overall concept of “Data Protection Laws,” which govern the handling and securing of specific data. While these laws are wide ranging, most of these laws reference Personally Identifiable Information (PII) This “refers to information th
Are you subject to Data Protection laws?
Are you subject to Data Protection laws? This blog introduces a new topic that many may be unaware of: Data Protection laws. These are laws that define fully, or in part, what type of data is covered by government regulations, proscribe general standards for the securing of covered data, and may al
Ransomware Part II
Ransomware Part II In our last blog, we explained what ransomware is, and why it can be an especially troublesome virus. Today, let’s look at what you can do to avoid falling victim. Prevention is the best cure. Follow standard “data hygiene” principles that you probably hear about all of th
When someone mentions Artificial Intelligence (AI) many things come to mind. Some may think of video games, factories, entertainment like YouTube, Pandora, Netflix, the list goes on and on. Going back 39 years AI was The Terminator and Skynet and everyone thought that creating thinking and learning
Ransomware part I
Ransomware part I The daily reports of cybercrime are important reminders about the need to protect your business from malicious behavior that could threaten the success of your business. There are so many different things that can attack your computer, steal your data, and wreck your day. One of t
Humans cause so much trouble
Have you been focusing on software packages and anti-virus tools to protect your data from hacking? That may not be enough, because it overlooks one of the biggest causes of security breaches. All of the security software and expertise in the world is useless if you or your employees don't
The Cloud: what do you get?
The cloud refers to using off site computing resources and storage to supplement or even replace the use of on-site/in-house resources. Instead of buying hardware and software to support your business, you are basically outsourcing this set of tasks. There are 4 benefits for the small firm and to