LANSPEED BLOG
 
 

 

POPULAR TOPICS:   SECURITY   |   DISASTER RECOVERY   |   BUSINESS CONTINUITY   |   CLOUD   |   STRATEGY/PLANNING

I.T. Checklist for Offboarding Employees

Aug 21, 2018 8:00:00 AM / by Chris Chirgwin posted in I.T., Security, Best Practices

0 Comments

According to Forbes, approximately 2 million Americans leave their jobs every month.  Regardless of whether you are in a small business or a Fortune 500 company, there are critically important steps that I.T. administrators should take when an employee leaves.  Even if the employee voluntarily left on great terms, it is critical to offboard the employee properly.  A recent study found that 89% of employees still had access to their company’s network and data after being let go.  If someone can still log in to servers, access confidential data, or even just tweet in the company’s name, they can wreak havoc in ways that reflect very poorly on the company - and on the I.T. staff within the company responsible for network and data security.  Insider attacks, including those by terminated employees, can be very costly and damaging.  An organization in the U.S. faces an average of 3.8 insider attacks per year.  We have put together a checklist of steps that should be completed immediately upon an employee departure. 

Read More

Protect your Home Computers, Too

Jul 11, 2017 8:00:00 AM / by Chris Chirgwin posted in Security

0 Comments

Are your computers at home as secure as those you use at the office?  In most cases, the PCs or Macs we use at home do not have the same level of protection as what businesses typically provide. 

Read More

Beware of the DocuSign Phishing Scam

May 23, 2017 8:00:00 AM / by Wendy Ballard posted in Security, News & Events

0 Comments

Since the year 2000, when the Electronic Signatures in Global and International Commerce Act became a U.S. Federal law, “e-signing” digital documents has become a convenience for many businesses, large and small. It saves time, it saves trees, but is it putting your company at risk?

Read More

WannaCry Ransomware: What is it? What can I do?

May 16, 2017 10:55:00 AM / by Michael LaFond posted in Security, Disaster Preparedness & Recovery, Best Practices, Managed Services, Network, News & Events

0 Comments

The WannaCry ransomware outbreak made big news this past weekend - it is said to have affected thousands of computers in more than 150 countries. It is important to understand what this outbreak is and ways you can prevent outbreaks such as these from having a catastrophic impact on your own network.
Read More

Our New Favorite Firewall for Security – the Sophos XG

May 16, 2017 8:00:00 AM / by Enedel Rivera posted in Security

0 Comments

A firewall separates the internet from your private network. It filters traffic in both directions and protects your network from DoS (Denial-of-Service) attacks, viruses, and hacking. Unfortunately, end users are still the biggest security risks and client-side attacks are inevitable. Thankfully, technology such as Security Heartbeat restricts network access to endpoints as soon as they become compromised.

Read More

The New I.T. Security Threat Landscape (and How We Have to Think Differently)

May 2, 2017 8:00:00 AM / by William Perdue posted in Security

0 Comments

In today’s Internet, there is never a break from the constantly evolving threats of phishing, malware, ransomware, and hackers. It is critical that as these new I.T. security threats evolve, IT and information security also evolves with them.

Read More

Datto: The Swiss Army Knife of Data Protection and Business Continuity

Apr 18, 2017 9:00:00 AM / by Chris Chirgwin posted in Business Continuity, Security

0 Comments

In the world of technology, there are new products and solutions coming to the market every day.  Every once in a while, a new technology appears that stands out and disrupts the space it is in.  The Datto Siris 3 is such a product - so much so that I’ve started call it the swiss army knife of data protection and business continuity. Not only is it a powerful business continuity solution, but it is one of the most effective tools in the fight against ransomware

Read More

How to Implement a Data Loss Prevention Strategy

Mar 28, 2017 9:00:00 AM / by Emily Holehouse posted in How To, Security, Disaster Preparedness & Recovery

1 Comment

The workplace is becoming increasingly mobile with users accessing corporate data from anywhere at any time. While this trend offers organizations significant productivity benefits, it also increases the risk of data loss that could cause irreparable harm.

Implementing security has traditionally been a clear cut decision. Because viruses were bad, anti-virus software often was deployed without user buy-in. However, since data loss prevention (DLP) deals with user privacy, user acceptance is imperative. Here are som e best practices that you can use to achieve buy in as you figure out how to implement a data loss prevention strategy:

Read More

Is Your Business Prepared for the Next Disaster?

Mar 8, 2017 9:00:00 AM / by Emily Holehouse posted in Small Business, Disaster Preparedness & Recovery, Security

0 Comments

California may be one of the most desirable places to live in the U.S., but we also have a plethora of natural catastrophes that we must live with and be prepared for.  Earthquakes, fires, floods, mud slides and tsunamis can and do affect us here on the Central Coast.  Unfortunately, most businesses are not ready to cope with these types of natural calamities.

Read More

Why Multi-factor Authentication is So Important to Your Security

Mar 7, 2017 9:00:00 AM / by Chris Chirgwin posted in Security, Best Practices

0 Comments

The vast majority of data breaches have occurred through compromised authentication.  Although having a strong password is an important part of security, this is only one step to securing your network and data.  That’s why multi-factor authentication is so important and why security experts today are strongly recommending it for critical business systems.

Read More
Top 15 most CRITICAL questions to ask about your network every month. 
 
 
Subscribe to our blog get a copy of our 100% free checklist:
 
Monthly IT Health Checklist

Search This Blog

Latest Posts

Popular Posts