Virtual Private Network – Pt.5


The implementation of a Virtual Private Network impacts both the end user and the overall IT infrastructure of your business.  After all, it is a new tool that your employees will be using in order to gain secured access to the shared resources that you provide to them in order for them to accomplish normal job functions. 

Read More ...
Virtual private network. Security encrypted connection.

Virtual Private Networks

For any Small to Medium sized Business (SMB) owner, recovering from a Cyber-attack or a security breach involves these procedures:

  1. Immediately securing the lines of defense at your organization;
  2. What to check for in your IT Infrastructure after your business has been impacted;
  3. Whom to notify in the case that a Cyber-attack has actually indeed happened;
  4. The kind of letter that should be written to the impacted parties (primarily those of customers, and any other third parties that you deal with, such as suppliers and distributors).

Read More ...

Ransomware Pt. 1

What Is Ransomware?

In today’s world, Cyber-attacks are getting much more covert and sophisticated in nature.  Gone are the days when an attacker would be merely content by simply deploying a Trojan Horse virus to secretly see what is going on in your computer. 

Read More ...
ITConsulting VCIOHero keyboard phone headset

Deploying Mobile Devices Securely pt.2


In this blog, we continue our series in how to secure wireless devices at your place of business.

How to Secure Mobile Devices in Your Environment

1)  Always test your mobile security policy and threat landscape before implementing it:

Before you start to implement and enforce your policies, it is always important to evaluate them first in a test environment to see how they will work in a real-world environment.

Read More ...
smartphone typing night scene 3

Deploying Mobile Devices Securely


As we all know, mobile devices have become not only an integral part of the workplace, but even in society.  Therefore, the safe deployment of these devices is of paramount importance not just for individuals, but businesses and corporations, government agencies, as well as other entities.

Read More ...
Military Image 5 Never Worry About Your Network’s Security

Incident Response Plan – Part 7

How to Report a Security Incident to External Stakeholders

The external stakeholders of the business or corporation are primarily your customers, and even the suppliers and distributors that you currently work with. 

Read More ...
PenetrationVulnerabilityTestingPhoto Man tablet digital lock

Incident Response Plan – Part 6

How to Report a Security Incident to Internal Stakeholders

As it has been discussed throughout this blog series, the need to respond quickly and to communicate on a real-time basis after an organization has been hit by a Cyber-attack is very critical.

Read More ...