Education Center

Articles, Training, Videos, Tips, eBooks, and More!

3 Tips To Reduce The Amount Of Spam That Makes It To Your Inbox

According to Talos Security Intelligence and Research Group, a division of Cisco Systems, 86 percent of emails sent worldwide are unwelcome junk mail, or spam. Not only is spam annoying, it can also be dangerous if you or one of your employees accidentally succumb to one of their schemes.

With the prevalence of spam today, not only do you need the right technology in place to keep it under control, you also need to educate your users on how to reduce the amount of spam that you may unintentionally be inviting in.

Read More

What To Do When The Cloud Goes Down

Technology is a great enabler.

Think of all the ways that your business is able to thrive, grow and serve your customers better – ways that didn’t even exist 18 to 24 months ago.

That being said, technology isn’t perfect. For all of the power that these systems bring, software will have bugs, hardware will fail and the Internet will go down. Having a plan for when that inevitably happens is what separates the companies that are able to continue business as usual when the unexpected occurs, versus those that lose productive time due to IT problems.

Read More

Ironman Challenges and Lessons Learned

It’s amazing how sports and life events parallel business principles sometimes.

Two weeks ago, I completed my second IRONMAN Triathlon. It was held in the Laurentian Mountains at Mont-Tremblant Ski Resort in Quebec, Canada, which means I spent MANY hours training in the local California mountains trying to get ready for this extremely hilly course. I trained very hard and was as ready as I could be for the 140.6 mile course.

Well, I finished…but not without some issues that could have been avoided with a bit of planning and situational decision making.

Read More

5 Ways To Spot A Social Engineering Attack

“I’m not going to make payroll – we’re going to close our doors as a result of the fraud.”

Unfortunately, that statement is becoming more common among smaller businesses, according to Mitchell Thompson, head of an FBI financial cybercrimes task force in New York.

The FBI reports that since October 2013 more than 12,000 businesses worldwide have been targeted by social engineering–type cyberscams, netting criminals well over $2 billion. And those are just the reported cases. Often, due to customer relationships, PR or other concerns, incidents go unreported.

These unfortunate events were triggered by a particularly nasty form of cyberattack known as “social engineering.”

Read More
Topics: I.T. Security

The Pros and Cons of Outsourcing IT Services

In today’s digital business world, it’s rare to find tasks that don’t require the use of a computer, tablet, or smartphone. This means that delighting your clients and keeping your employees productive depends heavily on the efficiency and competency of your company’s Information Technology department processes, whether it’s internally staffed or outsourced to a third party.

Read More

3 Major Mistakes Businesses Keep Making With Their IT Strategy

I see it all the time: Businesses create their strategic plan for the year where they lay out their goals and objectives for each department. It’s BEAUTIFUL, yet it gets derailed somewhere along the way and you wonder why these goals aren’t being met, or why it seems like the teams keep running into roadblocks.

Read More

Is Your IT Strategy Insane?

"Insanity: Doing the same thing over again and expecting different results" - Albert Einstein

If I have to put a label on this summer, it would be “Insanity”. 

Over the course of the last few months, my days have been spent meeting and chatting with business executives about achieving higher results from the technology investment they are making.

Read More

Shadow IT: Ignore At Your Own Risk

It’s one of those little secrets that nobody wants to talk about…

The term “Shadow IT” refers to apps and devices used at work that operate outside your company’s sanctioned policies and protocols.

Shadow IT takes many forms, like conversations on Facebook Messenger, Google Hangouts, Gmail or Skype. It can include software from Excel macros to cloud-based data storage apps such as Dropbox, Google Docs and Evernote. Or collaboration spaces like Slack, Asana and Wrike. And then there are devices: USB sticks, smartphones, tablets and laptops within your network that you have no control over.

Robert J. Moore, CEO of RJMetrics, relates how companies like Slack and Dropbox craft their pricing models to encourage rapid proliferation. One day, a few of his engineers were using Slack, then all the engineers, then the whole rest of the company was using it. He said, “We reached a point of no return and paying for it was pretty much our only option.”

Read More
Topics: I.T. Security

Social Engineering & IT Security: What Businesses Need To Know

Keyboard_hacker.jpg

Every day we’re presented with news of the “next big thing.” Disruptive technology developed by some of the most resourceful minds of our time has created tremendous value for companies. These revolutionary tools, which have completely changed the ways we work and play, are simply powerful.

The problem is that power isn’t always a good thing. In 1771, British-Irish statesman Edmund Burke said, “The greater the power, the more dangerous the abuse.” While his subject at the time had more to do with politics than technology, the statement holds the same truth today as it did then.

There are few places where power is abused more dangerously than in the cybercrime industry. According to “Net Losses: Estimating the Global Cost of Cybercrime,” a report published by McAfee, the cost to the global economy could be as high as $575 billion a year.

How should your business enlist in the global fight against cybercrime? As always, it is important to ensure you’re using the right combination of hardware and software to keep illicit software (malware) from being transmitted to your company’s network – but there is a new threat, and that threat is you.

Read More
Topics: I.T. Security

Keys to "Moving the Needle" and Hitting Company Goals

Have you heard the term “Moving the Needle” as it relates to business performance? I hear it frequently and, depending on who you talk to, the context can vary significantly.

Frequently business executives are dead-set on moving the needle, but really don’t know how or where to start. In many cases, the CEO or Leadership Team will create a list of big company tasks or goals, hand them out to the various affected departments, and check up on them once or twice per year. Most of the time, the Leadership Team is disappointed in the results. Why does this happen so often?

Read More