The IT Services & Cyber Security Education Center
The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.
By:
Barry Cavener
May 3rd, 2022
You’re looking for an IT manager to manage and maintain your business network, and you’re wondering how to make sure they’re the right fit. After all, you’re going to invest a lot into this person, so you want the most qualified, reliable, and capable person for the job. Or, as EOS would say, you need someone who “gets it, wants it, and has the capacity to do it.”
By:
Barry Cavener
April 12th, 2022
You see it in the news daily – another company has fallen victim to a cyber attack. As a business leader, you know it’s possible that a cyber attack could impact your company too, and that you need to take the necessary security precautions to keep your data safe. Yet when you look at your cyber security stature, you might find that you’re missing some essential cyber security layers – two of which are penetration testing and vulnerability scanning. These tests look for the holes in your network that an attacker can exploit. Both have their benefits. Which one is right for your business? Do you need both?
Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.
By:
Barry Cavener
March 17th, 2022
Cyber security comes up in every conversation we have with business leaders throughout Southern California these days. Business leaders know that the increase in cyber attacks on small to mid-sized businesses is a genuine threat and that increasing cyber security measures is of the utmost importance. One question we repeatedly hear during these discussions is: “what can I do to protect my business from cyber security threats”? The answer isn't as simple as one tool or technology to stop all cyber threats. Rather, it's a combination of security layers that are designed to protect your business from many angles. One of those critical layers is vulnerability scanning.