If you're a supplier, contractor or subcontractor with the federal government, you or your colleagues have no doubt heard of NIST 800-171. If you haven't, check out "Everything You Need to Know About NIST 800-171." for all of the details, and how it may affect your business contracts.
It seems like large-scale data breaches that expose thousands upon millions of records are regrettably becoming commonplace today. Protecting your personal and business data should be a priority for anyone that has ever entered information into a web form. Without taking proper steps to secure your data like login credentials, you could make yourself vulnerable to anything from phishing attacks to full account takeover (or even worse). Even a single breach can cost a business upwards of $2.3 million per attack (not to mention the costs related to things like the damage to your reputation) and personal accounts risk losing personal finances, priceless memories (like photos and videos), and more. One of the most basic ways to improve cybersecurity is to make sure you're following best practices for your passwords.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
It’s well known that cyber attacks on businesses are increasing every year. The fact that the number of city governments falling victim to hackers as well is just coming to light. In Connecticut alone, the City of West Haven, the Derby Police Department, and the Bridgeport School District have all experienced cyber attacks in the past year inflicting varying degrees of damage.
Kelser was in news outlets across the world this spring when the Associated Press quoted CEO Barry Kelly in an article titled “6 things small businesses can do to improve cybersecurity” which ran in the New York Times, Washington Post, ABC News, Daily Mail, Fox Business, and many more.
Unless you're already in the IT field, small and medium businesses likely don't have all the knowledge or in-house staff required to manage their IT infrastructure themselves. That's where a managed services partner (MSP) comes in.
When the news emerged that there was a security issue in Google Chrome, Kelser provided NBC Connecticut with some expert perspective.
Managed services providers (MSPs) offer 24/7 support for your entire IT infrastructure: software, hardware, and configurations. These services are remotely monitored and managed in order to keep a pulse on your IT environment at all times.
As technology relentlessly pushes forward, you and your organization will undoubtedly need to upgrade your hardware. However, you can’t simply forget about your old hardware while reaping the benefits of replacing it with the latest and greatest. You should be excited about the upgrade, but how will you transfer data from your old equipment to the new? How will you erase data from the original hardware?