It’s no secret that data breaches cost businesses a lot of money, an average of $3.86 million to be more exact. So what if there was a way to help recoup or cover some of the post breach expenses?[…]
Recently we talked about how to find the cost of downtime to your business, which is an important piece to developing your disaster recovery plan, for both proactive and reactive planning.
Can your small business survive a disaster, natural or otherwise? If you can’t answer that with a resounding “Yes!” and have a well documented plan to back it up, we’ve got some work to do. Having a[…]
After every major password breach comes new security features, and now, after the release of Collection #1...and #2, #3, #4, and #5, comes Google’s newest innovation to help secure your passwords and[…]
“IT Security threats come in all different shapes and sizes, and just as quickly as we put up barriers, cybercriminals find new ways to break through.” - Gary Watson, CTO of StorCentric and Founder[…]
In October of this year, as part of the National Cybersecurity Awareness Month developed by the National Cybersecurity Alliance, the Federal Trade Commission (FTC) launched a bank of resources for[…]
We talk a lot about how to keep yourself safe online, but sometimes we don’t focus enough on what you are supposed to be keeping yourself safe from. Last week I received an email about a specific[…]
One night last June (2017), I was working from home, writing some software that would add Microsoft multi-factor-authentication to a VPN service that IT Freedom offers. The software itself was[…]