January 8, 2019
The Need for IT Monitoring
If you are like most small businesses, when you buy a new piece of IT equipment, you might do some configuration on it, and then put it in use, and you’re done. You let it do its thing until it breaks. If you’re a very small shop, that might be good enough, as the overhead of doing more may outweigh the costs. However, if you are not very small, you may be costing yourself by not adding monitoring to your technology services.
April 26, 2018
Do You Control Your Mission Critical Data?
Cloud computing has caused a massive shift in how many companies do business; in some ways the shift is comparable to the introduction of the Internet itself. A big part of cloud computing is moving servers, raw data, application data, or business processes to the cloud.
December 27, 2017
Business and Home Security in the Age of the IoT (Internet of Things)
Most homes and businesses invest considerable effort in keeping their networks secure, yet many don't catch the gaping security holes that welcome unwanted intruders.
December 5, 2017
TekTalk: Cyber Security
CEO and Founder Robert Hood reviews the three segments to optimal security implementation: Defense, Monitoring, and Response. No matter the size, industry, or budget, Robert shares essential insight on how to protect your business.
October 24, 2017
Is there a Cyber Ninja after you?
It is important to consider two key points when discussing security for your information systems: security is a process, not a destination, and you can never be 100% secure. Security is a continual process of review, plan, implement, monitor, and repeat.