[vc_row][vc_column][vc_column_text]The 4th of May has been celebrated by Star Wars geeks for several decades. When spoken, the date bears a strong resemblance to the saying, "May the Force be with you." This year, there's another holiday worth geeky celebration...
Great Lakes Computer Corporation
What Is Cyber Liability Insurance? Do I Need It?
[vc_row][vc_column][vc_column_text] Cyber Liability Insurance is a service more and more insurers are offering, but is it just a waste of money? The word insurance makes people cringe. It presents the age old dilemma: Are you risk averse enough to pay for something...
HIPAA Breach Leads to $400,000 Settlement
[vc_row][vc_column][vc_column_text]In the 2017 Experian Data Breach Industry Forecast*, healthcare is highlighted as one of the top 5 data breach trends for 2017. “Healthcare organizations will be the most targeted sector with new, sophisticated attacks emerging.”...
Earth Day 2017: Sustainability Tips for the Workplace
[vc_row][vc_column][vc_column_text]In honor of Earth Day, we'd like to share some tips on how to ensure your workplace is operating in an eco-friendly and sustainable way. We've taken a few of our favorite tips from our blog posts and the web and compiled them here...
Top 5 Questions About EMV Chip Cards Answered
[vc_row][vc_column][vc_column_text] EMV use in the US has finally taken over. We are behind many countries in adoption, but we're getting close to catching up. Almost every POS system now has a chip reader, although they aren't all functional yet. There has been a...
Fake Emails to Ignore to Protect Your Cybersecurity
Hackers can be very clever, there's no doubt. They prey on uninformed email and internet users in the hopes of getting their malware into your network. Savvy users can spot the majority of spam emails and pop-ups pretty easily. But, sometimes we all get tricked. Here...
4 Key Benefits of Remote Server Monitoring
As your business grows, it becomes harder to stay involved and active in every aspect of your operations. The functions that generate the most income will get the most attention. Unfortunately, if you neglect to monitor certain aspects of your business, like your...
An Easter Malware Warning from Homeland Security
[vc_row][vc_column][vc_column_text] The United States Computer Emergency Readiness Team (US-CERT), a division of Homeland Security, published an important warning this morning regarding the upcoming holiday weekend and cybersecurity: As the Easter holiday approaches,...
EMV Adoption Leads to Surge in E-Commerce Fraud
[vc_row][vc_column][vc_column_text] EMV chip cards and readers were only introduced in the US in October of 2015. Yet, you already have chip cards in your wallet and use them daily. You also know, all too well, the growing pains associated with introducing this new...
The Key to Preventing Costly Network Downtime
The phrase "downtime" should bring one image to mind: a pile of money burning to ash. That's what network downtime does to your profits, destroys them. It's difficult to fully grasp the total cost of downtime because it's so muliti-faceted. In 2015, downtime was...