Tom McDonald

President of NSI, Tom has been helping small and medium businesses succeed in Connecticut for over 25 years.
Find me on:

Recent Posts

2019 Update: New Phishing Scam Goes After Your W-2 Form

By Tom McDonald | Jan 17, 2019 8:00:00 AM


You can’t trust anyone these days. Just look at your email inbox for proof. How many solicitations do you get each day for offers that are too good to be true? How many requests to open suspicious attachments or visit unknown websites that could contain malware?

Read More >

Watch Out for These Mobile Security Threats in 2019

By Tom McDonald | Jan 14, 2019 8:00:00 AM


Did you know that more than 74 percent of U.S. businesses either have a bring-your-own-device (BYOD) policy or plan to have one in place within 12 months? Sixty-seven percent of U.S. workers report using their own mobile devices at work, and the majority of those devices are smartphones. There are currently over 230 million smartphone users in the U.S., and that number is expected to grow to 270.66 million by 2022.

Read More >

The Four Types of Cyber Security Threats That Can Affect Your Local Business in 2019

By Tom McDonald | Jan 14, 2019 8:00:00 AM

Data security continues to be a problem that plagues businesses of all sizes. Big retailers like Target and Neiman Marcus are obvious targets, but small businesses can be targeted as well. And the threat can come from anywhere. Connecticut and Illinois investigators, for example, determined that the Target hack resulted from credentials stolen from a third party, and the result for Target was an $18.5 million settlement negotiated by Connecticut Attorney General George Jepsen, among others.

New call-to-action

Read More >

November Biz Events

By Tom McDonald | Oct 27, 2018 11:27:26 AM

 

Read More >

The Rapidly Changing Role of Cybersecurity Professionals in 2018

By Tom McDonald | Dec 20, 2017 9:00:00 AM

Cybersecurity is an ongoing challenge for Connecticut businesses, partly because cybercriminals are becoming more aggressive and cyberattacks are becoming more prevalent, but mostly because businesses aren’t equipped to deal with cybersecurity issues. IT resources are being stretched as it is and the shortage of cybersecurity professionals makes it harder to find the talent needed to fortify corporate enterprise networks. There is a gap in cybersecurity skills and Connecticut corporate leaders are going to have to adopt new strategies to bridge that gap.

Read More >

The Threat of Ex-Employees: Time to Update Your CT Company's Offboarding Process

By Tom McDonald | Dec 13, 2017 9:00:00 AM

One of the greatest threats Connecticut companies face when it comes to data security is ex-employees. Whether someone has been fired or left the company, failure to remove old passwords and update security protocols can leave corporate systems vulnerable to attack.

Read More >

Create Your 2018 SMB Cybersecurity Plan in 6 Steps

By Tom McDonald | Dec 7, 2017 9:00:00 AM

 

 
 
 
 
 
31:55
 
 
 
31:55
 
 
 
 
 
 
 
 
 
 

Thanks for reporting a problem. We'll attach technical data about this session to help us figure out the issue. Which of these best describes the problem?

Any other details or context?

Cancel
message
 
 
 
 
 
 
 

My name is Tom McDonald, and I'm the CEO of NSI. Today, what we're gonna talk about is how to create a 2018 SMB cyber-security plan in six steps. This is based on the NIS tape, NIST, Interagency 7621 report. Fifty-four pages of riveting information for the small business around information security and cyber-security. So I read this for you and condensed it, so you don't have to. You can thank me later.

Read More >

How to Manage Your IT if You Have Multiple Offices

By Tom McDonald | Dec 7, 2017 9:00:00 AM

One of the most satisfying indicators of business success is opening satellite offices. As many businesses grow, they open new locations to expand, but they still have to consolidate operations. For most businesses, that means centralizing computing resources while connecting remote offices to back-end business processes. What’s the best strategy to extend IT support across multiple locations?

Read More >