Over time, you’ve noticed some of the classic signs that you need extra help with your organization’s IT function: You’re struggling to hire someone with the skills or expertise you require for a particular job. As employees fight to resolve the most critical IT problems, your routine low-level maintenance activities are falling by the wayside. There’s limited bandwidth to work on long-term strategic projects that can bring more value to your business.
Joining forces with an IT managed services provider (MSP) gives you the benefits of having a full-time IT staff, without the full-time expenses that go with them. MSPs can enrich even small and medium-size businesses with a wealth of IT knowledge and experience that wouldn’t be available at the same price point with in-house employees.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
Improving record keeping and data handling is critical to keeping the trust of partners, vendors, contractors, and customers. The importance is magnified when the federal government is involved, with the goal of creating a national culture of cybersecurity that protects the information of our businesses, citizens, and government. The National Institute of Standards and Technology (NIST) created Special Publication 800-171 to help protect Controlled Unclassified Information. But what does that actually look like? How will you know you’re meeting the standards laid out in NIST 800-171? What is CUI?
As part of my role as CTO at Kelser, I am also vCIO for some of our clients, such as Hoffman Auto Group. A vCIO, also called a virtual or fractional CIO, performs the strategic function of a tech executive for an organization that doesn’t necessarily need a fulltime CIO in house.
I recently visited the set of Good Morning Connecticut to talk about the biggest cybersecurity stories in the news right now.
Only twice has Microsoft issued a patch for old, out-of-support versions of Windows: in 2017, just before the massive WannaCry cyber attack, and just recently. With newly discovered vulnerabilities from Intel, and even one in Windows 10, a very high number of computers around the world are potentially exposed right now. While we haven’t seen exploits yet to take advantage of these vulnerabilities, they likely aren’t far off. Conditions have scarcely been better for a massive cyber attack on the scale of WannaCry. Last week, I had the chance to break this down for listeners of the Brad Davis Show.
Cloud computing has been around for a while now, but it remains a bit mysterious to many in the business world. I was thrilled to have the chance to help well-known tech journalist John Edwards break down some common misconceptions and assumptions in an article for CIO.com.
From tornadoes and floods to security breaches and employee error, unexpected catastrophes can befall any type of business. While you may not be able to prevent or even anticipate disaster, you can be well-prepared before it strikes in order to minimize the impact and downtime. The importance of testing your plans for disaster recovery and business continuity can’t be understated.