The Rapidly Changing Role of Cybersecurity Professionals in 2018

By Tom McDonald | Dec 20, 2017 9:00:00 AM

Cybersecurity is an ongoing challenge for Connecticut businesses, partly because cybercriminals are becoming more aggressive and cyberattacks are becoming more prevalent, but mostly because businesses aren’t equipped to deal with cybersecurity issues. IT resources are being stretched as it is and the shortage of cybersecurity professionals makes it harder to find the talent needed to fortify corporate enterprise networks. There is a gap in cybersecurity skills and Connecticut corporate leaders are going to have to adopt new strategies to bridge that gap.

Read More >

The Threat of Ex-Employees: Time to Update Your CT Company's Offboarding Process

By Tom McDonald | Dec 13, 2017 9:00:00 AM

One of the greatest threats Connecticut companies face when it comes to data security is ex-employees. Whether someone has been fired or left the company, failure to remove old passwords and update security protocols can leave corporate systems vulnerable to attack.

Read More >

How to Set Your Remote Workers up for Success with IT Support

By Tom McDonald | Sep 27, 2017 9:00:00 AM

More employees than ever are working remotely, which is creating new challenges for Connecticut companies’ IT support teams. When users have to access business-critical data outside the office, it presents a different set of challenges to secure and manage corporate data. Every day, there are new internet and mobile technologies that are enabling new levels of remote office computing to increase productivity. However, if the IT support team can’t support and protect remote workers, your business can’t profit from the benefits of telecommuting.

Read More >

Will Autonomous Vehicles Create New Cybersecurity Risks for CT Businesses?

By Tom McDonald | Sep 14, 2017 8:00:00 AM

Not long ago the concept of viable self-driving cars seemed far-fetched, but the reality is that autonomous vehicles (AV) are here today, and likely to become commonplace within the next few years.While the technology is nearly perfected, there are still roadblocks to adoption, such as data security, which is something that should concern all Connecticut businesses.

Read More >

Potential Impact of Amazon for CT Small Business Owners and Entrepreneurs

By Tom McDonald | Aug 16, 2017 8:00:00 AM

Amazon is coming down out of the cloud. For those of you who haven’t heard, Amazon is bringing a new distribution center to North Haven at the site of the old Pratt & Whitney plant. This is going to be an 855,000-square-foot fulfillment facility that is expected to add 1,800 jobs, according to Governor Dannel P. Malloy.

Read More >

Are You the Biggest Threat to Your CT Company's Cyber Security?

By Tom McDonald | Aug 9, 2017 8:00:00 AM

Data security is a concern for anyone who runs a Connecticut company, but surprisingly, Connecticut entrepreneurs and CEOs may be the worst offenders when it comes to opening up the corporate enterprise to potential security risks.

Read More >

How Much Should CT Small Business Owners Spend on IT?

By Tom McDonald | Jul 20, 2017 8:00:00 AM

Whether you are a Connecticut small business or a global company, it’s important to have a formula to make sure you are spending the right amount on your IT infrastructure.

Read More >

Is Your CT SMB Vulnerable to the Next Worldwide Ransomware Outbreak?

By Tom McDonald | Jul 13, 2017 8:00:00 AM

The risk from ransomware is real and threatening Connecticut businesses. If you doubt that statement, consider the chaos created by the WannaCry/Petya virus in recent weeks. This malware attack rapidly spread worldwide, disrupting global businesses and costing companies millions in lost revenue and trying to kill the virus. Connecticut small to medium-sized businesses (SMBs) are particularly vulnerable to this type of malware attack.

Read More >

The Biggest Cybersecurity Threat Facing CT Businesses

By Tom McDonald | Mar 28, 2017 8:00:00 AM

You can’t trust anyone these days. Just look at your email inbox for proof. How many solicitations do you get each day for offers that are too good to be true? How many requests to open suspicious attachments or visit unknown websites that could contain malware?

Read More >