Category: security

4 Common Threats to a Business’ Data

For a business to run smoothly, it has to account for any potential threat to its regular operations. And with companies working online now more than ever, the internet can pose a significant threat....

Have You Tested Your Disaster Recovery Plan?

A recent article from Forbes that’s well-worth reading lists five major ways businesses perform poorly on IT disaster recovery. Second on the list is the failure to test disaster recovery plans. Why is testing necessary? Without testing the...

Watch For These RED FLAGS Online

These days, the internet is full of warning signals and red flags that most people just ignore because they assume nothing bad will ever happen to them; just to other people. This is a dangerous viewpoint...

6 Essential IT Security Services

As with any well-built system, effective cyber security begins with building a solid security foundation. Without thoughtful attention to building a good foundation, a business will remain vulnerable to hacks and breaches until they...

Six Steps of a Cyber Security Assessment

Cyber security risk assessment is an essential element of any information security program.  As the technology landscape continues to evolve, your company needs to take appropriate steps to make sure your data isn’t vulnerable...

4 Ways to Protect Your Company From Hackers

Small businesses are targeted by 43% of hackers because they often lack the same level of security as larger businesses. Companies may be vulnerable to a variety of attacks, including:   Denial of Service   Malware   Trojans...

Essential Network Security Support: ICMP Protocol Security

The TCP/IP protocol stack includes Internet Control Message Protocol (ICMP)  designed as a troubleshooting tool that can provide feedback to network devices either for status information or when problems such as network routing failures...