The Rapidly Changing Role of Cybersecurity Professionals in 2018

By Tom McDonald | Dec 20, 2017 9:00:00 AM

Cybersecurity is an ongoing challenge for Connecticut businesses, partly because cybercriminals are becoming more aggressive and cyberattacks are becoming more prevalent, but mostly because businesses aren’t equipped to deal with cybersecurity issues. IT resources are being stretched as it is and the shortage of cybersecurity professionals makes it harder to find the talent needed to fortify corporate enterprise networks. There is a gap in cybersecurity skills and Connecticut corporate leaders are going to have to adopt new strategies to bridge that gap.

Read More >

The Threat of Ex-Employees: Time to Update Your CT Company's Offboarding Process

By Tom McDonald | Dec 13, 2017 9:00:00 AM

One of the greatest threats Connecticut companies face when it comes to data security is ex-employees. Whether someone has been fired or left the company, failure to remove old passwords and update security protocols can leave corporate systems vulnerable to attack.

Read More >

Create Your 2018 SMB Cybersecurity Plan in 6 Steps

By Tom McDonald | Dec 7, 2017 9:00:00 AM

 

 
 
 
 
 
31:55
 
 
 
31:55
 
 
 
 
 
 
 
 
 
 

Thanks for reporting a problem. We'll attach technical data about this session to help us figure out the issue. Which of these best describes the problem?

Any other details or context?

Cancel
message
 
 
 
 
 
 
 

My name is Tom McDonald, and I'm the CEO of NSI. Today, what we're gonna talk about is how to create a 2018 SMB cyber-security plan in six steps. This is based on the NIS tape, NIST, Interagency 7621 report. Fifty-four pages of riveting information for the small business around information security and cyber-security. So I read this for you and condensed it, so you don't have to. You can thank me later.

Read More >

BYOD vs. CYOD: What Mobile Device Policy Is Ideal for Your Connecticut Company?

By Tom McDonald | Nov 22, 2017 9:00:00 AM

Mobile devices have become an integral part of corporate computing. More Connecticut workers are using smartphones, tablets, and laptops in the office, for telecommuting and when they travel, and companies are embracing these portable devices to boost productivity. At the same time, CIOs, CTOs, and CSOs have to make strategic decisions about the best way to manage mobile computing devices. Is it better to let employees use their own smartphones and tablets, or is company-issued hardware a better strategy? Which is better for your Connecticut company—bring your own device (BYOD) or choose your own device (CYOD)?

Read More >