You just purchased a brand new Cisco Catalyst switch for your expanding business. Fantastic! The question is, how do you secure your new investment? How do you keep your employee and customer data safe, your network running optimally, and the switch itself away from harm? While there are many approaches to security, even the most Read More >
Help, I’ve been hacked! Now what?
October 6, 2015 by Joe D. GrossbauerHow do I know when I’ve been hacked? First, let’s define “being hacked”. A hack is when someone unauthorized gains access to your system. The malicious intent of this someone can vary from a student pulling a prank to hacker trying to find and steal your most valuable data. The most common hack is somewhere Read More >
Top Five Things to Monitor in Your Network
October 2, 2015 by Brian MillerYour Website. If your network was the A-Team, then your website would be your Face. This what your clients see and respond to. When it’s running smoothly, your marketing stays on track. If it goes down, it gives your business an unprofessional appearance, and could cause the loss of new clients. We recommend that you Read More >
Five Quick Tips to Help Prevent Data Loss
September 30, 2015 by Bryan BrownBack it up! Having a back up of your data is crucial when something happens to your machine. But just setting up a back up and forgetting about it isn’t something that is advised. Periodically check to make sure the backups are running and giving any errors, even go the extra step and try to Read More >
Password Policies: Pitfalls and Solutions
September 30, 2015 by Joe D. GrossbauerWhat is a password policy? Password policies are used to set standard for passwords that will not be guessed or hacked. A password policy sets levels of security each employee must meet with their passwords. Often, password policies vary throughout a company. For instance, a system admin may have a stricter policy than a regular Read More >