It hardly ever gets reported on the news that every day hundreds of cyber attacks succeed against small and medium-sized businesses. Learn how to protect yours. Every week, citizens of the world learn of a large company or government agency suffering a successful cyber-attack. What hardly ever gets reported is the hundreds of cyber attacks […]

If you are giving a presentation and part of it involves a shared display or handouts of a spreadsheet what can you do to keep the group awake? Let’s face it, Microsoft Excel is an excellent tool for organizing and manipulating statistical data, but when sharing your spreadsheet with others, your spreadsheet has to be […]

As Verizon recently learned as they continue their plans to acquire Yahoo, failing to conduct a cyber security assessment as part of M&A due diligence can be costly; any business considering an acquisition should learn from Verizon’s misstep.   While companies generally understand the importance of conducting thorough due diligence before agreeing to acquire a […]

Mobile devices can create significant security and management challenges, especially if they hold confidential information or can access the corporate network. Require users to password protect their devices, encrypt their data, and install security apps to prevent criminals from stealing information while the phone is on public networks. Be sure to set reporting procedures for […]

are you a small to midsize business in Seattle, who wantsto turn technology into a power tool for your success?

are you a small to midsize business in Seattle, who wantsto turn technology into a power tool for your success?

are you a small to midsize business in Seattle, who wantsto turn technology into a power tool for your success?

Prevent access or use of business computers by unauthorized individuals. Laptops can be particularly easy targets for theft or can be lost, so lock them up when unattended. Make sure a separate user account is created for each employee and require strong passwords. Administrative privileges should only be given to trusted IT staff and key […]

Ransomware creates a nightmare scenario for every business it targets. It results in lost access to critical systems and data, prolonged downtime, lost productivity, and lost profits. And as ransomware continues to become more sophisticated, the level of risk small and mid-sized businesses face increases. The impact to business continuity, productivity, and reputation alone are […]

Let's get to work

Fill out our form and we'll contact you as soon as possible.