Cybersecurity & IT Insights

Password Policies

Password policies are often seen as a nuisance by both employees and employers. However, they are essential for maintaining a secure work environment. In this blog post, we will discuss the importance of strong password policies and how they can help your business...

read more

The Undying Business System Revolution

Have you heard about Agile?  It’s the hot new business system, replacing Six-Sigma as the most sought-after resume tag.  When it comes to successful businesses, it’s out with the black belt, and in with the scrum master.  Like most business systems, Six-Sigma was...

read more

Data Sprawl

Just as Houston's lack of zoning regulations has led to some incongruous juxtapositions, the lack of data zoning in many companies can lead to similar problems. While there is a great deal of value in allowing different departments to use the software-as-a-service...

read more

Data Backups Alone Can’t Save You from a Hurricane

The first hurricane of the season is scheduled to hit Florida, and many businesses in that state are readying their contingency planning.  Hurricanes aren’t uncommon for most areas of Florida; any business that’s been around for a few years has been through this...

read more

Physical Security Is Network Security

In a recent interview with CBS, a security expert at IBM demonstrated the alarming ease with which she could gain access to sensitive information through social engineering. By simply posing as a friendly stranger, she was able to obtain the passwords of unsuspecting...

read more

Small-Town Technology Constraints

We’re located just a few miles south of downtown Raleigh, which is one of the most tech-forward areas in the country.  But there are plenty of small towns only 20 to 30 miles away – towns that are well within our service area but offer a very different environment...

read more

Avoiding Cyberattacks by Leveraging Access and Vigilance

In today's volatile digital landscape, the threat of cyberattacks looms over businesses more than ever. From phishing scams to data breaches, the risk factors are diverse and constantly evolving. What's often overlooked is the pivotal role employees play in...

read more

Internal Controls

This lady to the right is Martha Jean.  She was probably well-liked at work.  She probably went out of her way to make sure others felt like she was a competent, dependable co-worker. She didn’t want to raise any flags at the awning manufacturer that employed her,...

read more

Cyberattacks Caused By Off Autopilot

Cyberattacks Caused By Off Autopilot People don’t trust much these days.  Six in ten don’t trust Facebook at all.  Forty-six percent don’t trust the press at all.  In fact, fifty-two percent don’t even trust polls like the ones just referenced. Despite all this...

read more