Does My Company Need a Security Operations Center Service (SOC)?

Does My Company Need a Security Operations Center Service (SOC)?

You can’t manage what you can’t see. Even a small network generates over 250,000 logs per hours. An impossible task for a human to review. We now live in the days of sophisticated digital hackers so your concern shouldn’t be if you’re going to get hacked, but what you’re going to do when it happens.

4 Tips to Avoid a Communication Breakdown

4 Tips to Avoid a Communication Breakdown

We've all had a relationship go sour over time, a communication breakdown if you will. Here are 4 tips to keep communications flowing throughout the relationship.

As a business leader the communication piece is our responsibility.  Our responsibility is to look after the interests of our clients - end of story.

Top 5 Reasons to Be Thankful for Technology

Top 5 Reasons to Be Thankful for Technology

Technology has become so richly interwoven into the fabric of our lives it would be hard to imagine doing some of our most common tasks without it.

We are capable of navigating unfamiliar routes, checking bank balances, listening to music, shopping, reading and much more, all from just our smartphones.

Calculating the Cost of Downtime in Your Business

Calculating the Cost of Downtime in Your Business

Introduction
What would an hour of downtime cost your business? As a business owner, I’ve had many slick salespeople try to convince me of things using huge formulas and best case scenarios for their cause. This article really breaks down the reality of downtime, the necessity of uptime and how it can work for your business.

HIPAA Audits – The Wait is Over – It’s Real This Time

HIPAA Audits – The Wait is Over – It’s Real This Time

HIPAA Audits – The Wait is Over – It’s Real This Time

As an IT professional, there are several things that always keep you up at night when you’re responsible for the overall security and well-being of other business interests. The items change over time, but it seems there is always something, right?

Currently, the two items that concern me the most are Crypto-Ransomware attacks that are ever changing and affect all clients (I wrote on this in a recent blog here) and Phase 2 HIPAA Audits that have recently begun.

The Anatomy of a Crypto–Ransomware Attack And How to Prevent Them

The Anatomy of a Crypto–Ransomware Attack  And How to Prevent Them

Almost every day there is a big corporation that is getting hit by one of the variance of the Crypto – Ransomware malware. For every big case that makes the news there are thousands of others that are being affected. These attacks are not going away anytime soon.

The Theory of Constraints

The Theory of Constraints

This blog is designed to further explain The Theory of Constraints and define some of the processes and applications for discovering and solving the constraints in a business setting.

Breached – Healthcare Data Breaches Cost $6 Billion a Year

Breached – Healthcare Data Breaches Cost $6 Billion a Year

In today’s environment, the core of any security strategy needs to shift from breach prevention to breach acceptance.” – Gemalto, data security firm

Times they are a changing when you see a prominent security firm relenting to the fact that breaches are unstoppable.

5 Keys to Building a Better Team at Work

5 Keys to Building a Better Team at Work

One of the biggest challenges for any entrepreneur or business person is what Gino Wickman; author of the book Traction, calls “Letting go of the vine.” This simply means to trust those around you more and put responsibilities on others. There is a very important step before this is prudent, and that is to surround yourself with people who have a love for the “vine” and a clear understanding of how the “vine” operates.

9 Steps to an Effective Cyber Security Plan

9 Steps to an Effective Cyber Security Plan

There is not a day that goes by that you do not read in the paper or hear on television that some company has been the victim of Cyber Crime. The alarming thing is that for every incident that you hear about there are probably six more that have happened that you don’t hear about.