Small-to-medium sized businesses and large enterprises may seem worlds apart, but they face many of the same cyber-security threats.   In fact, in recent years, cyber-criminals have increasingly targeted SMBs.  This is because it’s widely known that SMBs have a smaller budget and less in-house expertise to devote to protection.  Thankfully, there are several things SMBs can do today to get more from even the most limited security budget that doesn’t involve cutting corners.  Far too often, SMBs cut the wrong corners and it ends up costing them more money in the long run....

Disaster recovery and business continuity plans are issues that almost all small businesses fail to think about. More frequently, they decide they haven’t the resources to address such “unthinkables.” If your business was down for 1-2 days or more, what costs would you incur? Lost revenues and lost productivity – These are obvious. You won’t make the money that you would have if you remained open. This is especially true if you provide a service. Services are inherently tied to time, and time cannot be re-created. Sure, you can work extra hours next...

Remember… Always Practice Safe BYOD No matter what blog or magazine read these days, it seems like everyone is talking about today’s increasingly mobile workforce and the BYOD (Bring-Your-Own-Device) movement. We live in an exciting time when work can be done at any time from any place. Employees love the fact that they can get work done on their iPad as they sit poolside sipping a Pina Colada. Businesses love the cost savings along with the happier and more productive employees they’re noticing. Meanwhile, customers and clients take note that their emails are...

Small-to-medium sized businesses today face many challenges, particularly things like increased mobile device use and unexpected network growth. While every business wants to grow, the problem with unplanned growth is that it can quickly turn chaotic from a technical standpoint; often resulting in companies and organizations sloppily scrambling to add new users, devices, and applications to meet service expectations. When immediate needs take precedent over business-as-usual there can be long-term ramifications – even previously organized networks can rapidly deteriorate...

Four Key Components of a Robust Security Plan Every SMB Must Know Most businesses are now technology dependent. This means security concerns aren’t just worrisome to large corporate enterprises anymore, but also the neighborhood sandwich shop, the main street tax advisor, and the local non-profit. Regardless of size or type, practically any organization has valuable digital assets and data that should not be breached under any circumstances. This makes it the responsibility of every business, especially those collecting and storing customer/client information, to implement a...

It’s natural for small-to-medium sized business owners to try to emulate the success of a competitor or like-minded entrepreneur or firm. It’s always wise to model business practices after those worth imitating, assuming you’re also picking up on areas of potential weakness that you can capitalize on for a competitive gain. Carrying yourself like a big leaguer will at least create the perception to others that you’re an equal. It also increases the likelihood of achieving a far greater level of success. A Major Difference Between Successful SMBs and the Not-so...

Mobile Device Management (MDM) tools are beneficial to many small-to-medium sized businesses that are just now transitioning into the Bring-Your-Own-Device (BYOD) workforce movement. SMBs can leverage MDM tools to centrally automate otherwise manual IT responsibilities like device enrollment. This allows businesses and organizations to see and control what company or employee-owned smartphones and tablets access the enterprise. This simplifies not just device management and monitoring but secures corporate data as well. Concerning the use of the MDMs, it’s important to note...

IS THE CLOUD RIGHT FOR YOUR HEALTHCARE PRACTICE, ORGANIZATION OR FACILITY? Despite the fact that the cloud offers healthcare providers, facilities and organizations substantial relief and efficiency, the industry has been slow to transition data to cloud storage. Most of this apprehension can be traced to concern about remaining HIPAA compliant in the cloud and the sometimes-literal life and death need for constant data accessibility. But as the healthcare sector converts from paper medical records to electronic health records by the government mandated 2015 deadline, the benefits...

The adoption of technology from the simplest of matters to the most complex problems has rendered us heavily dependent on it. We love paying our bills minutes before they are due. We enjoy seeing loved ones face-to-face on our computer screens. We can access and print our extremely sensitive records from government and financial websites in a matter of minutes instead of waiting for the mail for days. The time and resources that technology saves are invaluable, but this convenience has a very ugly side. This convenience brings costs, which could include irreparable financial,...

There are many threats to the integrity of a small business, and not all of them are as dramatic as a cyberattack or a hurricane. Every small business needs to do a risk assessment to determine all the threats that exist that could bring harm. External threats are the ones that get the the most attention. These can be big snowstorms or hurricanes that bring down power lines and network connections. They can also be man-made. A power outage due to a grid failure, or an act of terror. Also in this category are phishing scams, cyber attacks and data theft from external sources. All of...