The Threat of Ex-Employees: Time to Update Your CT Company's Offboarding Process

By Tom McDonald | Dec 13, 2017 9:00:00 AM

One of the greatest threats Connecticut companies face when it comes to data security is ex-employees. Whether someone has been fired or left the company, failure to remove old passwords and update security protocols can leave corporate systems vulnerable to attack.

Read More >

Create Your 2018 SMB Cybersecurity Plan in 6 Steps

By Tom McDonald | Dec 7, 2017 9:00:00 AM

 

 
 
 
 
 
31:55
 
 
 
31:55
 
 
 
 
 
 
 
 
 
 

Thanks for reporting a problem. We'll attach technical data about this session to help us figure out the issue. Which of these best describes the problem?

Any other details or context?

Cancel
message
 
 
 
 
 
 
 

My name is Tom McDonald, and I'm the CEO of NSI. Today, what we're gonna talk about is how to create a 2018 SMB cyber-security plan in six steps. This is based on the NIS tape, NIST, Interagency 7621 report. Fifty-four pages of riveting information for the small business around information security and cyber-security. So I read this for you and condensed it, so you don't have to. You can thank me later.

Read More >

How to Manage Your IT if You Have Multiple Offices

By Tom McDonald | Dec 7, 2017 9:00:00 AM

One of the most satisfying indicators of business success is opening satellite offices. As many businesses grow, they open new locations to expand, but they still have to consolidate operations. For most businesses, that means centralizing computing resources while connecting remote offices to back-end business processes. What’s the best strategy to extend IT support across multiple locations?

Read More >

BYOD vs. CYOD: What Mobile Device Policy Is Ideal for Your Connecticut Company?

By Tom McDonald | Nov 22, 2017 9:00:00 AM

Mobile devices have become an integral part of corporate computing. More Connecticut workers are using smartphones, tablets, and laptops in the office, for telecommuting and when they travel, and companies are embracing these portable devices to boost productivity. At the same time, CIOs, CTOs, and CSOs have to make strategic decisions about the best way to manage mobile computing devices. Is it better to let employees use their own smartphones and tablets, or is company-issued hardware a better strategy? Which is better for your Connecticut company—bring your own device (BYOD) or choose your own device (CYOD)?

Read More >

The Art of War and Cybersecurity: Trends and Training for your Team

By Tom McDonald | Nov 15, 2017 8:00:00 AM

 

Welcome, everyone. My name is Tom McDonald. I am the CEO of NSI and I appreciate you giving us some time and taking the time to view the webinar we're gonna go through today. So what we're gonna talk about today is how to stay up to date on cybersecurity and cyber threats as a busy CEO. And what I'll attempt to do here is relate this to the teachings from "The Art of War" by Sun Tzu. So as we go through this presentation today I will put together some of the lessons we learned in the book, how it relates to what's going on in today's cyber warfare landscape.

Read More >

Connecticut IT Managed Service Provider NSI Acquires Laser Network Solutions, Inc.

By Tom McDonald | Nov 14, 2017 9:00:00 AM

NSI Initiates Connecticut Expansion Plan with Acquisition of Laser Network Solutions Inc.

Read More >

The Free Cybersecurity Training That All CT Business Owners Should Watch

By Tom McDonald | Nov 10, 2017 8:00:00 AM

In previous blog posts, we have emphasized the importance of data security and the fact that every business can expect a data breach at some time or another. Cybercriminals are increasingly targeting Connecticut small to medium-sized businesses (SMB) to steal potentially valuable information, and to hijack SMB computing resources to attack other businesses. When launching these attacks, hackers target the weakest link—your employees. That’s why cybersecurity training is essential for every organization.

Read More >

Do You Use Your SmartPhone for Work? Watch Out for These Mobile Security Threats

By Tom McDonald | Nov 8, 2017 8:00:00 AM

Did you know that more than 74 percent of U.S. businesses either have a bring-your-own-device (BYOD) policy or plan to have one in place within 12 months? Sixty-seven percent of U.S. workers report using their own mobile devices at work, and the majority of those devices are smartphones. There are currently 224.3 million smartphone users in the U.S., and that number is expected to grow to 270.66 million by 2022.

Read More >

Disaster Recovery Basics for Connecticut Small Businesses

By Tom McDonald | Oct 18, 2017 9:00:00 AM

It’s still hurricane season, and as I write this, Hurricane Harvey recently swept through Texas, leaving Houston underwater, and Hurricane Irma is pounding Florida. Natural disasters cost billions of dollars, and in Connecticut, we routinely suffer from natural disasters such as winter storms and blizzards that disrupt power and shut down businesses. Then there are man-made disasters such as cyberattacks that can bring your business to its knees. No matter what the disaster, you want to restore normal operations as soon as possible, and that means understanding disaster recovery basics in order to develop a disaster recovery plan.

Read More >