The recent leak of 8,000 pages of CIA documents has exposed the tools and methods used by the agency to surveil and capture information from smartphones, TVs, routers and other devices. Aside from the obvious national security implications of this leak, its impact on businesses of all types and sizes could be enormous if IT departments do not pay close attention.
A recently released study by Arctic Wolf Networks, “The State of Mid-Market Cyber Security: Findings and Implications,” reveals that major gaps exist among IT professionals between the perception and reality of cyber security challenges.
The survey found that IT professionals at smaller companies had very high confidence in their cyber security defenses, but in reality they struggled to defend against malicious activity that has become more sophisticated, more targeted and severe.
A recent report from CompTIA indicates that SMBs are ready to spend big on technology this year, even when it’s not clear whether their business goals are being met after implementation.
Of 600 businesses surveyed, only 16% believe they are getting an excellent return on their tech investments. While 44% claim good ROI, another 40% characterized their results as “just okay” or “disappointing.” Continue reading
Organizations are facing an onslaught of new security challenges and are busy deploying tools to tighten up their networks against hack attacks. Despite these efforts, email remains a highly successful attack vector for cyber criminals because it’s still too easy for employees to fall victim to social engineering ploys that can result in catastrophic data breaches. In the face of this formidable threat, what can be done?
Providing employees with the ability to work remotely – with full access to their desktop voice and data and applications – has become an essential element of business continuity, especially in our area, where a winter snow blast can suddenly force streets and buildings to close, potentially putting your business on hold.
Growth in the Cloud computing market is being driven by the need of companies to power their core business systems in addition to their customer-facing applications. Organizations that have not yet explored hybrid and Cloud computing now have ample incentive to do so, or risk being left behind by their competitors.
Here are a few great reasons to start thinking about a Cloud implementation for your business… Continue reading
After Indianapolis-based American College of Education fired its IT manager, it discovered that the administrative password to its Google cloud account was changed, preventing 2,000 graduate students nationwide from accessing their email, papers and course work.
If your organization handles protected health information, as defined in the Health Insurance Portability and Accountability Act of 1996 (HIPAA), you are required to conduct comprehensive and timely risk assessments. As Federal regulators ramp up their audit activities, the potential for enforcement action is now a reality.
Financial services encompass banks, insurance companies, investment firms, analysts, consultants, and many more firms – each overseeing highly sensitive data on behalf of their clients and staff. As a consequence, this industry is subject to a range of regulatory compliance standards, including…
There’s a better way for organizations to utilize their IT staff – free them up so they can work on strategic projects that improve competitive position, market share, and the bottom line. To help you achieve this, DataLink can handle all of your day-to-day IT monitoring and maintenance, or just when you need some extra help. Check out our ManageIT portfolio…