BLOG
The Legend of the Mighty Dragon Named Ransom and the Noble Hero Sir Waident – PART 2
Here is a short story NOT based on our clients and all characters are fictional. Meet the characters: An evil dragon named Ransom – a metaphor for evil hackersThe noble knight, Sir Waident – the hero who saves the dayKing and Queen – pragmatic rulers guiding their...
The Legend of the Mighty Dragon Named Ransom and the Noble Hero Sir Waident – PART 1
Here is a short story NOT based on our clients and all characters are fictional. Meet the characters: An evil dragon named Ransom – a metaphor for evil hackersThe noble knight, Sir Waident – the hero who saves the dayKing and Queen – pragmatic rulers guiding their...
Curious Tech – October 2022
“Curiouser and curiouser!” Cried Alice (she was so much surprised, that for the moment she quite forgot how to speak good English).” ― Lewis Carroll, Alice's Adventures in Wonderland / Through the Looking-Glass One of the things that I like most about...
Employees Still Working From Home? Golden rules for the manager of a hybrid office.
When the COVID pandemic hit, companies scrambled to get everyone working remotely. Some got there faster than others but everyone figured out what worked through trial and error, then settled into a “routine.” In my experience, business leaders were not worried about...
The Great Resignation’s Impact on IT
I’m sure you’ve heard the phrase “The Great Resignation” by now. It’s the phenomenon driving droves of employees out of the workforce. Perhaps you're feeling its effects because you've lost great people in your organization or maybe because you're having trouble...
9 Steps Manufacturers Can Take to Prevent a Ransomware Attack
Recent attacks on critical suppliers in the gas and food industries have illustrated how hackers attack easy targets, inflict serious pain, and extract easy money from pressured executives. Using what we've learned from recent attacks here are 10 steps manufacturers...
Oh, Sh*t! You Seriously Mean to Tell Me That I Could Lose All of My Cloud Data?
Most of us would probably agree that the cloud has turned out to be a boon for business computing. But, have we grown too confident in “the cloud” and now putting too much faith in the cloud systems we are using? Do you assume that your data is secure and that data...
Choosing an MSP: No. 2. Strategic Alignment and POV on IT
Does the MSP share our vision for IT and its purpose? Financial viability is critical for an MSP. Prudent financial management ensures that the proper investments are being made in the business and that the MSP can survive the booms and busts of technology trends....
IT Support is NOT IT Security
I hear all too often from business leaders who think their IT Support team and their Security team are synonymous. They just assume that Support addresses all of their security needs by default. After all, the IT Support gang has been managing the anti-virus software...
Choosing the Right MSP for Your Business
There are probably as many “How to Choose a Managed Service Provider” guides online as there are MSPs. Do you really desire to consume another piece of self-promotional “content”? I’m going to assume that the answer is “No.” Well, my goal is to NOT add to all that...
Recovering from Cyber Risks in SMBs Using the NIST Framework
A ransomware attack happens every 11 seconds. In 40% of companies that get hacked, the same organization is hit again within 9 months. I don't share that to scare you (Although, it should get your attention.) It happens because companies think they have addressed and...
Responding to Cyber Risks in SMBs Using the NIST Framework
Prudent business leaders and risk managers understand that identifying, protecting against, and detecting risks are necessary, albeit fallible, actions to mitigate a complex world full of risks. As we have seen from prior posts, cost, time, and resource tradeoffs...
Subscribe
Get our latest tools and thinking.