Security and your sub-contractors

Uncategorized Archives | 48 Technologies, LLC

Security and your sub-contractors

So you feel relatively comfortable that you have created cyber security around your data and your employees are trained to avoid security errors in their day-to-day business ( a MAJOR source of security breaches, by the way.) However, you may be overlooking one area where you are exceptionally vulnerable. What protection do you have from

Read More...

Humans cause so much trouble

Have you been focusing on software packages and anti-virus tools to protect your data from hacking? That may not be enough, because it overlooks one of the biggest causes of security breaches. All of the security software and expertise in the world is useless if you or your employees don’t remain vigilant about their behavior

Read More...

Your front door is talking

If you’ve been following the news, the Internet of Things is getting increasing attention. You’re probably also thinking this is some Silicon Valley fancy thing that will take years to reach the rest of us. Not really. You probably already have some items of your own tied into the Internet of Things. First of all,

Read More...

What the cloud means for you–Part II

Recently, we talked about ways the cloud brings value, business protection, and economies of scale to the smaller firm that they could never achieve by themselves. Today, we look at a final benefit of the cloud. Protection against on-site disaster – If a disaster strikes your physical business location, on-site resources can be damaged, destroyed,

Read More...

Password basics people still ignore

You can have all the locks on your data center and have all the network security available, but nothing will keep your data safe if your employees are careless with passwords. Change Passwords – Most security experts recommend that companies change out all passwords every 30 to 90 days. Require passwords that mix upper and

Read More...

Cyber Crime and Security for SMBs

Did you know the illicit trading of personal data was worth $3.88 billion last year? Cybercrime is a growing industry known for its innovation. It goes far beyond the image many of us have of some hacker kid in his basement. Many who engage in this activity are professionals and work in large teams. Some

Read More...

The most boring topic Ever

Yes, today’s blog is about office phone systems. You have one. They are dull, necessary, and no one wants to deal with them. They need to be re-configured for new employees, they’re confusing, and the telco lines probably cost you more money than you’d like. Like everything else, office phone systems began transitioning to fully

Read More...

NPO’s and volunteer security nightmare

Not-for-profits have an unusual issue regarding security. Firms that have trained, paid full-time employees have a strong level of control over the actions of their workers. NPOs, however, may rely heavily on volunteers whose time in the office may be minimal and sporadic. You may feel grateful for their dedication and be less likely to

Read More...

The Cloud means no more stormy weather

Many small firms are pretty busy handling their own business.  Most don’t give much thought to what they would do if a natural disaster. What would happen to your business a tornado hit your physical location and cut power, or physical access to the building. What if the equipment storing all of your data and

Read More...

Higher goals get dragged down by Tech: The NPO story

If you are a smaller Not-for-Profit, it is likely that your organization has been driven from its inception by individuals strongly motivated with a passion for their cause or humanitarian goal. As a result, it is also possible that the leadership has little interest in developing the administrative technology infrastructure that is necessary for any

Read More...