Data Security

Having Trouble Obtaining Cyber Insurance? You’re Not Alone

Having Trouble Obtaining Cyber Insurance? You’re Not Alone

    Learn How to secure & insure your organization, plus, get FREE pizza! Register for our Cyber Insurance Webinar TODAY! IT has gone from being a minor part of most businesses (particularly smaller ones) to being one of the key aspects of their success and...

read more
Apple Operating System Vulnerability Leads to Critical Updates

Apple Operating System Vulnerability Leads to Critical Updates

It seems like there is constantly a new update for the Apple platform. Just last month (August 2022), Apple announced the 15.6.1 update which included some critical and necessary changes due to a recently discovered vulnerability in the operating systems, only to then...

read more
Cyber Insurance is Becoming Harder to Obtain

Cyber Insurance is Becoming Harder to Obtain

As the complexities and diverse risk profiles for protecting business IT security increase, cyber insurance coverage is becoming harder to obtain. Before IT security became as important as it is now, cyber insurance wasn't something that many organizations thought...

read more
Why Cyber-Ready Now is Not Enough

Why Cyber-Ready Now is Not Enough

We frequently discuss and stress the importance of protecting your digital assets today. Across the country, this is becoming more important to businesses. Case in point: According to Price Waterhouse Cooper’s June 2021 U.S. Digital Trust Insights Snapshot, “Cyber...

read more
How to Protect Your Business Before It’s Too Late

How to Protect Your Business Before It’s Too Late

  IT security consists of multiple facets and is crucial in today's deeply digitized world. As a business owner, your IT components—the sensitive data, software, and hardware—are the backbone of your company’s success. So, it’s crucial to protect them beyond just hack...

read more
Essential Two-Factor Authentication Basics

Essential Two-Factor Authentication Basics

One of the unvarying truths of the digital world in which all of us–business owners or consumers–operate is that cybercriminals constantly evolve their attacks. This means that the things we used to do for secure access to sensitive account systems like online banking, stock apps, or email accounts usually have to evolve too. One of these evolutionary methods has been two-factor authentication, also known as TFA or 2FA.

read more
Simple Steps to Improve Your Company’s Cybersecurity

Simple Steps to Improve Your Company’s Cybersecurity

As a general rule, digital security—for companies and web-connected organizations of all types—is subject to all sorts of potential threats. These could come from online organized crime, hostile foreign governments, individual hackers, and fraudsters with a penchant for stealing data or funds.

read more
Now In Sandusky! Broader Reach, Same Great Service.

Now In Sandusky! Broader Reach, Same Great Service.

Great Lakes Computer is opening a convenient new location! While the headquarters will remain in Avon, Ohio, we are adding a satellite office near downtown Sandusky. This prime spot will enable us to better serve our traditional business customers in Northwestern...

read more
Penetration Testing? What Is It and Why Do You Need It?

Penetration Testing? What Is It and Why Do You Need It?

  Risk associated with cybersecurity threats and exposures motivate organizations to implement protective controls intended to keep their digital assets safe from malicious computer hackers. Firewalls are installed at the network perimeter to keep unauthorized users...

read more