Data Protection

Disaster Protection: Why Your Business Needs BCDR Now

Disaster Protection: Why Your Business Needs BCDR Now

  Disasters sometimes strike. They can take on many forms (fire, hurricane, earthquake, theft, etc.) and either be localized or fully global. The COVID-19 Pandemic was one particular example on a global scale, but it's far from the only kind of catastrophic event we...

read more
Essential Two-Factor Authentication Basics

Essential Two-Factor Authentication Basics

One of the unvarying truths of the digital world in which all of us–business owners or consumers–operate is that cybercriminals constantly evolve their attacks. This means that the things we used to do for secure access to sensitive account systems like online banking, stock apps, or email accounts usually have to evolve too. One of these evolutionary methods has been two-factor authentication, also known as TFA or 2FA.

read more
Simple Steps to Improve Your Company’s Cybersecurity

Simple Steps to Improve Your Company’s Cybersecurity

As a general rule, digital security—for companies and web-connected organizations of all types—is subject to all sorts of potential threats. These could come from online organized crime, hostile foreign governments, individual hackers, and fraudsters with a penchant for stealing data or funds.

read more
Now In Sandusky! Broader Reach, Same Great Service.

Now In Sandusky! Broader Reach, Same Great Service.

Great Lakes Computer is opening a convenient new location! While the headquarters will remain in Avon, Ohio, we are adding a satellite office near downtown Sandusky. This prime spot will enable us to better serve our traditional business customers in Northwestern...

read more
GLC Partner, SentinelOne, Acquires Attivo Networks

GLC Partner, SentinelOne, Acquires Attivo Networks

It’s common knowledge that standard antivirus and firewalls are no longer enough to properly protect your business in today’s tech savvy world. As hackers and viruses become smarter, your protection needs to be stronger. So to bring our clients the best Endpoint Detection and Response program to protect their networks, we partner with SentinelOne. They are one of the best innovators when it comes cybersecurity solutions.

read more
Penetration Testing? What Is It and Why Do You Need It?

Penetration Testing? What Is It and Why Do You Need It?

  Risk associated with cybersecurity threats and exposures motivate organizations to implement protective controls intended to keep their digital assets safe from malicious computer hackers. Firewalls are installed at the network perimeter to keep unauthorized users...

read more
3 Reasons SMBs Need Managed Service Providers

3 Reasons SMBs Need Managed Service Providers

Managed Service Providers (MSPs) are often brought in to handle specific IT tasks that small-and-medium-sized businesses no longer want their IT guy doing in-house, because they aren't the best use of a salaried employee's time. Projects like repetitive monitoring and...

read more

How to Expose (or Uncover) Your IT Security Risks

Conducting a vulnerability assessment is important because the exercise will identify security flaws that exist in your information technology environment before they are discovered by a malicious computer hacker. Once the vulnerabilities are discovered, you can...

read more