A cybersecurity budget can seem like a daunting thing to calculate for any size organization, but it doesn't have to be. As long as you and your executive team assess and understand the risks you face, and the solutions you need to protect against them, you can...
business continuity
Cybersecurity Post Pandemic
The COVID pandemic affected many things across the country, but the impact it had on the IT world was catastrophic--particularly when it comes to cybersecurity. Employees working from home opened many businesses up to cyberattacks since many used unsecure networks to...
Why Cyber-Ready Now is Not Enough
We frequently discuss and stress the importance of protecting your digital assets today. Across the country, this is becoming more important to businesses. Case in point: According to Price Waterhouse Cooper’s June 2021 U.S. Digital Trust Insights Snapshot, “Cyber...
How to Protect Your Business Before It’s Too Late
IT security consists of multiple facets and is crucial in today's deeply digitized world. As a business owner, your IT components—the sensitive data, software, and hardware—are the backbone of your company’s success. So, it’s crucial to protect them beyond just hack...
Disaster Protection: Why Your Business Needs BCDR Now
Disasters sometimes strike. They can take on many forms (fire, hurricane, earthquake, theft, etc.) and either be localized or fully global. The COVID-19 Pandemic was one particular example on a global scale, but it's far from the only kind of catastrophic event we...
Be Ready! Your MS Office and Outlook Could Stop Working in October
If you use Microsoft Office and Outlook, it may be time for preparations to begin! Microsoft announced that starting on October 1st, 2022, early versions of Office and Outlook will stop working! It’s been in the media since last year. We at Great Lakes have reminded...
Essential Two-Factor Authentication Basics
One of the unvarying truths of the digital world in which all of us–business owners or consumers–operate is that cybercriminals constantly evolve their attacks. This means that the things we used to do for secure access to sensitive account systems like online banking, stock apps, or email accounts usually have to evolve too. One of these evolutionary methods has been two-factor authentication, also known as TFA or 2FA.
Simple Steps to Improve Your Company’s Cybersecurity
As a general rule, digital security—for companies and web-connected organizations of all types—is subject to all sorts of potential threats. These could come from online organized crime, hostile foreign governments, individual hackers, and fraudsters with a penchant for stealing data or funds.
Now In Sandusky! Broader Reach, Same Great Service.
Great Lakes Computer is opening a convenient new location! While the headquarters will remain in Avon, Ohio, we are adding a satellite office near downtown Sandusky. This prime spot will enable us to better serve our traditional business customers in Northwestern...
What to Look For in an IT Outsourcing Provider
Many small to medium sized businesses today at some point or another consider IT outsourcing. Gaining access to enterprise level IT support at SMB prices makes a lot of business sense. But, as with any vendor, it's important to find the right Managed Services...