According to Forbes, approximately 2 million Americans leave their jobs every month. Regardless of whether you are in a small business or a Fortune 500 company, there are critically important steps that I.T. administrators should take when an employee leaves. Even if the employee voluntarily left on great terms, it is critical to offboard the employee properly. A recent study found that 89% of employees still had access to their company’s network and data after being let go. If someone can still log in to servers, access confidential data, or even just tweet in the company’s name, they can wreak havoc in ways that reflect very poorly on the company - and on the I.T. staff within the company responsible for network and data security. Insider attacks, including those by terminated employees, can be very costly and damaging. An organization in the U.S. faces an average of 3.8 insider attacks per year. We have put together a checklist of steps that should be completed immediately upon an employee departure.
CRN®, a brand of The Channel Company, has named Lanspeed to its 2018 Managed Service Provider (MSP) 500 list in the MSP Pioneer 250 category. This annual list recognizes North American solution providers with cutting-edge approaches to delivering managed services. Their offerings help companies navigate the complex and ever-changing landscape of I.T., improve operational efficiencies, and maximize their return on I.T. investments.
The ever-increasing need for technology in schools is driving a greater demand for a wide range of I.T. support. Similar to a growing business, schools need I.T. experts to help plan, architect, deploy, support and manage their I.T. environments. Wireless networks, security, content filtering, high-speed broadband, storage and device management are just a handful of the technology solutions that schools have become reliant upon. However, the majority of schools struggle with finding the budget and expertise to achieve their I.T. objectives.
How long can your business afford to be without its information infrastructure? Can your business survive a complete loss of data? Do you have an I.T. disaster recovery plan in place for the following scenarios and has it been tested?
Are your computers at home as secure as those you use at the office? In most cases, the PCs or Macs we use at home do not have the same level of protection as what businesses typically provide.
Since the year 2000, when the Electronic Signatures in Global and International Commerce Act became a U.S. Federal law, “e-signing” digital documents has become a convenience for many businesses, large and small. It saves time, it saves trees, but is it putting your company at risk?
A firewall separates the internet from your private network. It filters traffic in both directions and protects your network from DoS (Denial-of-Service) attacks, viruses, and hacking. Unfortunately, end users are still the biggest security risks and client-side attacks are inevitable. Thankfully, technology such as Security Heartbeat restricts network access to endpoints as soon as they become compromised.
Businesses and organizations depend on information to survive and to ensure business continuity. However, in I.T. protecting information from an ever-growing array of potential disasters is an ongoing challenge. It’s not enough to simply have a backup of your data – there are some critical steps that should be taken to effectively prepare your organization for when that disaster happens. Below are four practical and important areas to address when putting together a Business Continuity and Disaster Recovery (BCDR) plan.
In today’s Internet, there is never a break from the constantly evolving threats of phishing, malware, ransomware, and hackers. It is critical that as these new I.T. security threats evolve, IT and information security also evolves with them.