Is there a Cyber Ninja after you?

Is there a Cyber Ninja after you?

It is important to consider two key points when discussing security for your information systems: security is a process, not a destination, and you can never be 100% secure. Security is a continual process of review, plan, implement, monitor, and repeat. It is not...
TekTalk: The Principles of IT Budgeting

TekTalk: The Principles of IT Budgeting

SpotLink TekTalks are a speaking series aimed to educate and support San Diego’s small and mid-sized businesses on the importance of proper IT Management. Topics range from disaster recovery, to crucial security measures, and even budgeting for the next fiscal year....
Two Factors of Proper Data Management

Two Factors of Proper Data Management

IT service providers have two key roles when it comes to ongoing operations, Data Protection and Data Security. Data Protection ensures data stays available for business use across hardware, environmental, and personnel failures. I have spoken on this topic in past...
TekTalk: Surviving Technology Disasters

TekTalk: Surviving Technology Disasters

SpotLink TekTalks are a speaking series aimed to educate and support San Diego’s small and mid-sized businesses on the importance of proper IT Management. Topics range from disaster recovery, to crucial security measures, and even budgeting for the next fiscal year....
IT Alert:  WannaCry Ransomware

IT Alert: WannaCry Ransomware

Last Friday a new version of Ransomware, dubbed WannaCry, was release worldwide, affecting computers in as many as 99 countries. This morning a new variant was also released. Companies such as FedEx, the British National Health Service, and LATAM airlines have been...