Entries by ABaker

The Value of a Business Continuity Plan

Depending on the region your organization is located in, disasters can take the form of hurricanes, floods, tornadoes, earthquakes, fires, power outages or severe snow storms. “Roughly 40 to 60 percent of small organizations never reopen their doors following a disaster.  But you can.”   —   fema.gov Imagine hard drives crashing, threats faced from computer viruses, […]

Bryley Basics: Password Protection

Passwords are typically stolen during what’s called a phishing attack. Phishing emails are malicious emails sent by criminals attempting to compromise your personal information. They often appear to be legitimate, so beware! Most phishing emails are disguised as messages from an authoritative entity asking you to visit a website and enter personal information. These websites […]

The Benefit of a VPN

The news is filled with how internet service providers have the ability to track our web surfing habits and the numerous data breaches that occur – it is no secret that online privacy is nearly non-existent.  Private browsing features can temporarily cover up your browsing history, but they do not completely protect your online activities. […]

The Internet of Things: Convenience vs. Risk

The Internet of Things (IoT) is everywhere.  These convenient devices are in our homes and offices as well as in our pockets.  Along with the convenience they provide there are some security risks associated by using these devices.  There have been a number of known security breaches reported in the news regarding this topic, and […]

How to Tell a Client You Are Relocating Your Office

Making the decision to relocate your organization is the first step in the process of a very long list of to-do’s.  It is a complicated but rewarding process.  It will take careful planning to eliminate employee downtime and for you to minimize the impact on your business’ day-to-day operations. One of the crucial tasks involved […]

Manufacturing Organizations – A Prime Target for Malicious Cyber Attacks

On May 12th, 2017, a dangerous ransomware virus named WannaCry, infiltrated thousands of computers across the globe.  Ransomware worms its way into a network, encrypts files, and locks them down until a ransom is paid. The creators of WannaCry designed the ransomware to hold business data hostage until a ransom was paid. After 3 days, […]