[vc_row][vc_column][vc_column_text] Why SMB's need to go beyond pre-installed antivirus In a climate where cyber attacks are becoming a reality for every level of business, choosing the right antivirus and antimalware is a vital part of maintaining consumer confidence...
Data Protection
BBB Offering Scam Alerts – Like an AntiVirus Software for your Life
[vc_row][vc_column][vc_column_text] BBB Launches Scam Alert Text Service As a proud member of the Greater Cleveland Better Business Bureau, I was exciteed to see the announcement earlier this month about a new service for consumers and business owners in which they...
Warning: New Malware Threatening Data Security
[vc_row][vc_column][vc_column_text] New kid on the malware block teaches SMBs old lesson Stealing account numbers and access passwords to financial resources is almost par for the course for today's malware, but according to Trend Micro, there really is something new...
New IT Security Threat Tactics Proliferate During First Half of 2013
[vc_row][vc_column][vc_column_text] US is most prevalent spam producing nation in 2013 The midpoint of the calendar year provides businesses with a chance to evaluate their progress so far so that they can make more accurate predictions about the six months to come,...
Cyber Criminals Targeting SMB Websites – IT Support More Critical
[vc_row][vc_column][vc_column_text] Data Backup and Disaster Recovery Growing in Importance to Small Business Survival I am continually getting phone calls and emails from colleagues and customers with stories of how they know an SMB whose website was targetted by...
Were You Surprised About The NSA?
M. Ursula Herrmann is Great Lakes Computer's guest blogger on Government IT Security. You may also recognize her from her work on Crain's Cleveland Business as a guest blogger on Network Security. Ms. Herrmann is a Network Security Analyst living in Juneau, Alaska. ...
Why Instituting Data Backup Regulations Will Pay Off in the End
[vc_row][vc_column][vc_column_text] SMB's should avoid being penny wise and pound foolish on data security and IT support According to one of the latest studies in the data security field, businesses that decry the cost of following new regulations may well be putting...
A Lesson on IT Security – We are Under Attack!
[vc_row][vc_column][vc_column_text] Proper IT Security is the way to fight off attack. Came across this article on ComputerWorld.com and found it compelling for a number of reasons. Firstly, the message is on target. We are under attack. As the article states, last...
BYOD Forcing Creative Ways to Tackle Network Security
[vc_row][vc_column][vc_column_text] BYOD has company IT departments on edge about network security Bring Your Own Device, or BYOD, is increasingly becoming a common issue when companies address their network security needs. Whether it is laptops, smartphones, or...
Regulations Complicate Data Backup Practices
[vc_row][vc_column][vc_column_text] Cloud backup adoption in today's regulatory environment In the 21st century marketplace, information is the lifeblood of a growing number of businesses both large and small. Although this has made the need for adequate data backup...