The IT Support Learning Hub
The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.
In a recent blog article, Marty Kaufman recounts the story of meeting with a business owner who was panicked and in crisis mode because of a cyber attack. If we could backtrack to the days, weeks and months before the attack, we would probably find that the business owner did not pay much attention to cyber security at all because he didn’t think that a data breach could happen to him. Well, it could, and it did. We can’t go back in time and undo all the damage that has been done by this cyber attack, but we can help other executives avoid stumbling over some common misconceptions that unknowingly increase cyber risk.
When cyber security is part of your business strategy, it acts like a fitness plan. You’ll never know what illnesses or injuries you avoided by being on the plan, but you notice that your ability to maneuver is much better than your peers. Still, it’s often difficult for executives to contemplate the ROI of cyber security. Maybe that’s because you can’t directly measure the output from the input. You can, however, when you make it a habit to consider security alongside your business goals.
Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.
It might be time to drop the word “cyber” when talking about cyber security because managing cyber risk is really about managing business risk. IT certainly plays an important role in how information technology systems and stored data are protected, but executives need to understand that there is more at risk than they realize. For example, executives sometimes make decisions in the name of productivity or cost savings that compromise security. Perhaps these decisions would be made differently if the executives realized what a risky situation their actions created and they asked themselves these five questions.
Just recently, I learned about a local business that experienced a cyber attack. All of the employees were sent home to work from their personal computers because the owner was afraid that using their business systems would make matters worse. This business owner called and asked me to come over to talk with him about the situation. As I sat in his conference room and discussed what was going on, he was actually being attacked while I was there! Bank accounts and financial information were being compromised real time.
You’ve just typed up your monthly email to your loyal followers and clients and you hit the magic button — send!
Threats from malware, complicated projects, and out-of-date equipment are front and center in executive conversations with Information Technology (IT) support firms right now. This past month, demand for my consulting time has been at an all-time high. As I advise business leaders and managers who are trying to get better results from IT, the first part of the discussion usually consists of defining exactly what IT is.
January 14, 2020 marks the end of support for one of the most popular operating systems for businesses – Windows 7. It was released in 2009 and has served us well, but the end is near and it’s time to start planning your transition.
I bet most of you don’t wake up in the middle of the night sweating about Internet Bandwidth – my team and I do. Over the course of the last few years, the Internet and connectivity have become one of the most important topics of business conversations. Why, you ask? Today, almost every organization uses the Internet and its associated bandwidth for mission-critical applications. Companies are using cloud based-applications ranging environmental control systems (thermostats) and billing software, to ERPs and Shop Floor Control systems. Software manufacturers and the users of these systems (you and your employees) have become completely dependent on Internet availability. We expect it from jacks on the wall and from Wi-Fi systems, and we’re lost without it. Even a little blip in business Internet performance today interrupts voice calls, manufacturing production, billing, warehouse management, distribution systems, medical office patient processing, etc.
We all know that email scams are going around like crazy these days. Our goal is to keep you and your company safe. There are a few simple techniques that will help with our security efforts. In this article, we’ll cover: Creating a Secure Password How to Recognize and Avoid Phishing Scams And Steps to Prevent Fraudulent Payments So, let's dive in.
This month has been a security and compliance whirlwind! The European Union’s General Data Protection Regulation (GDPR) went into effect on May 25, 2018. I’m sure you’ve received a LOT of emails from companies notifying you that they’ve updated their privacy policies. This is just one step companies are taking to become GDPR compliant. We’ve been getting a lot of questions about GDPR and compliance, so here’s a brief overview about what’s going on, and what you may need to do.