Hacker Convention Warns: Don’t Allow Your Network to Be “Faxploited”

Brett Harney Network Security

There are plenty of access points for a hacker, and they’re often tied to our very high-tech devices – all the pieces of hardware with “smart” in front of them for one example. But sometimes our dinosaurs, the work-horse predecessors of our fast-paced IT, are the ones holding open a back door for security weaknesses. At Def Con 26, an …

5 Network Security Pitfalls Putting You at Risk

Brett Harney Network Security

Security is rightfully at the forefront of most business owners’ minds. There are new breaches reported on every day and no size business, from major enterprise to SMB, is safe from being targeted. There are many options for hardware and software that provide protection, but a network security policy is just as critical. Many times, though, we find that these …

Bring Your Own Device - BYOB

How to Implement a Successful BYOD Policy

Brett Harney BYOD

It’s quite obvious that BYOD is here to stay, especially with the increased popularity and sales of smartphones and tablets. The benefits are apparent, and we hear them over and over again. But that doesn’t mean all businesses are doing it the right way. There are still concerns surrounding BYOD, but there’s a way to move past them. IT naturally …

Outdated Technology

The Dangers of Outdated Technology

Brett Harney Uncategorized

No machine is meant to last forever. Your refrigerator, your car, and your servers are all depreciating in value and efficiency the moment they leave the factory. Technology advances so quickly that older versions are quickly becoming outdated technology. But that legacy equipment didn’t come cheap and it’s hard to let go of something you’ve invested so much time and …

cyber security

A Solution for SMBs Looking for Protection from Cyber Crime

Brett Harney Cloud, Network Security

In the wake of the WannaCry attack, cyber security concerns have escalated, as they should. The statistics on data breaches are harrowing. SMBs represent more than 50% of data breaches. The National Cyber Security Alliance found that 60% of small companies are unable to sustain their businesses over six months after a cyber-attack. The proliferation of ransomware alone is astounding. …