Is Pokemon Go One of the Greatest Threats to Data to Hit CT?

By Tom McDonald | Aug 23, 2016 8:00:00 AM

When a new mobile app goes viral you have a goldmine. Consider Pokemon Go. Nintendo more than doubled its stock price in a few weeks thanks to the popularity of the new game that superimposes Pokemon virtual reality on gamers’ reality. However, with new apps such as Pokemon Go there are unanticipated security risks as well.

Read More >

How Much Could a Cyber Security Attack Cost Your Organization?

By Tom McDonald | Aug 19, 2016 7:23:30 AM

Cybersecurity is complex and the risks from a security breach are underrated. Cyber criminals are at work around the clock, finding new ways to break into corporate networks to steal personal data, financial data, and intellectual property. As a result, CIOs are continually balancing the risks versus the returns of their cybersecurity investment. It seems impossible to stave off all types of security threats, so how much protection do they really want to pay for? It’s like buying insurance; how much coverage is enough and can you have too much?

Read More >

The Top 5 IT Security Threats to Your Small Business Data In 2016

By Tom McDonald | May 9, 2016 8:55:00 AM

With new enterprise technology comes new security concerns. Cloud computing, social media, mobile technology, the Internet of Things (IoT), and other technologies are making it easier to access and use business-critical data, but each new technology seems to bring its own risks. With more businesses relying on digital information, the thing that keeps owners of small businesses and CIOs up at night is keeping that information safe from cyber threats.

Read More >

How MDM Software Can Help Unlock Work Phones For Government Purposes

By Tom McDonald | Apr 19, 2016 7:55:00 AM

The recent controversy regarding the FBI’s efforts to coerce Apple into writing a universal key to unlock iPhone security has shone new light on the need for mobile device management (MDM) software. As you probably know, the FBI sought a means to access the iPhone of Syed Rizwan Farook, the gunman responsible for killing 14 people in San Bernardino. The FBI argued that Apple had to develop software to access Farook’s iPhone data. Apple argued that the FBI’s request would require them to create a universal skeleton key that could compromise security on any iPhone. While all of this is now a moot point, because the FBI was able to unlock Farook’s phone without the help of Apple, the part of the story that few hear is that the FBI could have easily unlocked Farook’s iPhone if San Bernardino County had installed MDM software.

Read More >

Is "Like Us on Facebook" Risky Business?

By Tom McDonald | Jun 6, 2014 9:35:00 AM

Connecticut computer company, NSI, shares this incredible TED Talk featuring Jennifer Golbeck.  Jennifer discusses how social media platforms like Facebook track us through our "Likes". 

Read More >