The IT Support Learning Hub
The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.
This month has been a security and compliance whirlwind! The European Union’s General Data Protection Regulation (GDPR) went into effect on May 25, 2018. I’m sure you’ve received a LOT of emails from companies notifying you that they’ve updated their privacy policies. This is just one step companies are taking to become GDPR compliant. We’ve been getting a lot of questions about GDPR and compliance, so here’s a brief overview about what’s going on, and what you may need to do.
With the recent enforcement of the European Union’s General Data Protection Regulation (GDPR) on May 25, 2018, there’s been a lot of talk regarding regulatory compliance; specifically, who is responsible for what.
Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.
In March 2018, Microsoft released their bi-annual Security Intelligence Report. Microsoft scanned 400 billion email messages, 18 billion web pages, and 1.2 billion devices for threats. But what does that mean for small business? What are the hackers' methods? How can you protect your company?
Most small business executives agree that cyber security threats are real. From malware to phishing scams, many have gone through the pain of losing data, money, productivity, or all of the above. If you haven’t suffered a loss yet, you should count yourself among the lucky. You know that your company data should be secured as much as possible, but cyber security is an expansive topic with many areas to cover, so where do you start?
Cybersecurity is much more than an IT problem these days - it's become a general business problem. Before we dive in, let's remember that cybersecurity is not just a topic for large corporations. It affects EVERYONE, especially those in the small to mid-size business (SMB) market. The revelation of the Meltdown and Spectre vulnerabilities reminds us that cybersecurity affects everybody, individuals and businesses alike. Statistics are pointing towards hackers focusing a lot of energy on SMBs this year. Why, you ask? Good question.
If you’ve been following the news, you may have heard about two new security threats, called Meltdown and Spectre. Your technology security is critical to us and we’ve been monitoring the situation closely since the news broke on Wednesday, January 3rd. Details are still unfolding, so we’ll keep you posted. Here’s what we know now.
The Internet has changed how we do business. Now if only I had $1 for every time I heard that, the Internet would’ve also changed my tax bracket. In all sincerity, IT departments have the challenge of keeping your network safe. With the growing number of cyber threats and the amount of data companies are storing today, IT is in a real pickle. Security is of the utmost importance, so it’s scary when a vendor asks for access to your network.
Coffee has been bested by WiFi – the world officially runs on wireless internet access. I don’t say this lightly, but the other day I noticed that a gas station offered free guest WiFi. And at that moment, I realized mobility is key to making your customers happy. I’m willing to bet that you’d have to think hard about the last time you went somewhere that DIDN’T offer public WiFi.
The best, and arguably the worst, thing about the rapid growth of technology is options. Long gone are the days where chocolate or vanilla were your only choices. In a post-Ben & Jerry’s world of Truffle Kerfuffle and Chubby Hubby, how are you supposed to know what to pick? And maybe the million-plus specialty ice cream flavors out there isn't exactly the same. But it’s easy to feel as overwhelmed by specialty ice cream as when you’re evaluating your server options.
We’re living in a time where cybercrime and ransomware attacks are announced like the next big box office hit. They’re making an impact worldwide, and it’s causing many businesses to suffer downtime, loss of business, and increased costs to recover from attacks. One of the most common types of scams affecting businesses is referred to as phishing. Phishing attacks are generally emails that entice users to perform an action, like clicking a link to an infected webpage, opening a malicious attachment, or even wiring money.