AI is getting a ton of hype these days. Opportunities abound for all parts of the organization to deliver more value for less. But how do you define a smart AI strategy? How do

Cybersecurity

6 Reasons Why Businesses Should Upgrade to Windows 10
End of life for Microsoft Windows 7 occurred in January, meaning support, security patches or service is available, time to make the switch.

IT Compliance

GDPR Information
4 four little letters that spell BIG headaches for American companies that do business or partner with companies overseas. It should be a serious concern for these organizations, and it doesn’t look like it is going away anytime soon. If

IT Outsourcing

Security Service Providers: What Organizations Look For
According to an October 2018 cybersecurity report by FutureWatch, organizations have made their needs clear about what they need from security providers. Technical Capabilities According to the research, 63% of organizations consider technical ability the most important attribute of a

IT Compliance

HIPAA at a Glance
HIPAA or the Health Insurance Portability and Accountability Act is a set of practices that govern the privacy of individual health records. You may have heard of data sets that would be covered under HIPAA such as Personally Identifiable Information,

Cybersecurity

Your Cyber Risk Doubled in 2018
In a recent SANS Survey of IT Professionals who voiced concerns about endpoint security, several alarming patterns emerged, all pointing to continued escalation of risk to organizations of every size. Devices Everywhere Organizations are increasingly deploying a greater number and

Cybersecurity

Unpatched Vulnerabilities: Why Most Businesses Can Be Easily Hacked
Over 70% of businesses will leave holes in their defenses for over a month, will you do the same? According to recent research, most businesses will not patch critical security breaches, even after 3 full months. When these openings are

Cybersecurity

Dark Matters: Discussing Dark Web Scans
Let us start by saying that the Dark Web can be a dangerous place for the inexperienced user. Drugs, illegal software, murder for hire, hacked user accounts and other illicit services are just a few of the things found there.

Cybersecurity

Beyond Hardware or Software: How Next Generation Firewalls Define Your Cybersecurity
Next Generation Firewall Given the abbreviation NGFW, Next Generation Firewalls are rapidly becoming one of the most critical features of any cybersecurity defense. These newer types of firewalls go far beyond the older, traditional port-based firewalls to include multi-purpose security

Blog

Can Your Business Recover Quickly From Disasters Such as Hurricanes?
If you own or manage a business on or near the Atlantic Ocean, you are aware that the Atlantic Hurricane Season runs from roughly May through November each year. Last year’s hurricane season produced six major hurricanes of Category 3

Blog

South Carolina Insurance Entities – Take Cyber Action Now
On May 3, 2018, South Carolina Governor McMaster signed into law the South Carolina Department of Insurance Data Security Act. The Act intends to protect personal information managed by insurance agencies, brokers, and carriers in South Carolina from cybersecurity threats. South

Blog

Common Cyber Scams
The risks organizations face from cyber threats are at epidemic levels. The threats are sophisticated, attack your weakest links (your employees) and are continuing to evolve at an alarming rate. Here are some of the most effective cyber scams Corsica

Blog

Cyber Insurance is the Last, Not First Step in Risk Mitigation
In the world of risk… specifically risk mitigation, cyber insurance is the last chapter in your cybersecurity playbook. Let me explain: The goal of any security plan is to mitigate (stop or reduce) threats as much as possible. In a