In-House or Outsourced IT: Which Is Best for Your Business?

By Tom McDonald | Jul 24, 2019 7:59:28 AM

Growing a Connecticut small business is not easy, especially now that the state faces an economic crisis. Every decision that business owners make needs to keep in mind a return on investment or savings in overhead.

Read More >

4 Reasons Why CT Businesses Need Cyber Insurance [Infographic]

By Derek Marin | Jul 19, 2019 12:59:10 PM

Cybercrime is a very real problem for small businesses in Connecticut. Hackers are coming up with new ways to break into networks, steal confidential customer data, and wreak havoc on business systems. Connecticut is among the top riskiest states in the US when it comes to cybercrime, with almost three-quarters of Connecticut businesses having suffered a cyberattack in recent years.

Read More >

Security Breach Response Best Practices for CT Businesses

By Derek Marin | Jul 3, 2019 6:51:22 AM

After years of working with small businesses on cybersecurity, we understand the impact a security breach can have on an organization. It’s a time of high stress, tight deadlines, and competing priorities. 

Read More >

Is Windows 10 Security Enough Protection for My Small Business?

By Derek Marin | Jun 19, 2019 2:28:33 PM

Like virtually every small business in the US, your office probably runs on Microsoft Windows 10. Windows 10 is the most popular operating system in the world. It offers the widest selection of business applications, is well supported, and it’s secure... right?

Read More >

Vulnerability Assessment Checklist for Small Businesses

By Derek Marin | Jun 12, 2019 8:45:00 AM

Vulnerability assessments sound like fun, right? Are you shaking your head? Okay, well, at least you know it's important! I mean, it makes sense to understand our network's weak spots before we buy all kinds of solutions.

However, you have lots of questions, and rightfully so because there's a lot to consider before we embark.

So, in this post, NSI teamed up with Caleb Christopher to tackle the important questions about vulnerability assessments, and give you a checklist that will help you select a trustworthy vendor.

Read More >