Insights in IT Security

Placing Less Demand on Passwords Allow Companies to Gain Stronger Online Security

Posted by Tom Rizzo on Apr 7, 2016 10:30:00 AM


Over the last few years, many companies have announced that they will be adding two-factor authentication methods for logging into their servers. There is something to be said for companies that are placing less demand on creating strong passwords, to gain a better security advantage. Downgrading the worth of standard credentials in lieu of SSO (single sign-on) credentials and two-factor authentication can make a dramatic impact on increasing the security level of the company’s website, or server.


Topics: Multi-Factor Authentication

Top 5 Signs You Need Better Password Management

Posted by Tom Rizzo on Mar 24, 2016 7:30:00 AM

Learn more now!

A password manager is an effective tool for generating, organizing, and maintaining username/password combinations. For an additional layer of security, many individuals and companies incorporate two-factor authentication using hardware or software solutions. This additional layer of security minimizes the potential for cyber-attacks from individuals that can decipher passwords.


Topics: Password Management Best Practices

Building Your Business with the Power of Three

Posted by Tom Rizzo on Mar 17, 2016 8:00:00 AM


Every business these days needs to have its roots in a digital environment. It would be madness to only accept cash and attempt to keep your accounting by hand. Likewise, you couldn’t possibly manage your employees or reliably market your business without software and the Internet. Sufficed to say, no matter how you plan on making a living, it likely is not possible without computers and the World Wide Web. This means proper security measures are vital.


Topics: IT Security

Protect Your Company with a Remote Access Policy

Posted by Tom Rizzo on Mar 10, 2016 7:30:00 AM


Many businesses now offer the opportunity of telecommuting, where employees are allowed to work from remote locations, including from home. Telecommuting is often used as a tool to attract and retain the best employees available in the market. Using the best tools designed for remote access allows the employee to work from any location as though they were at their office desk. This helps to enhance employee productivity, while providing the opportunity to work from any location that has Internet access.


Topics: IT Security

Risks of BYOD to Company Data and Employee Hardware

Posted by Tom Rizzo on Mar 3, 2016 9:00:00 AM


The growing trends of “Bring Your Own Device” (BYOD) solutions are providing more significant results than anticipated, to the consumerization of the IT department of any small, medium and large sized businesses. The trend is driven more by the preference of the consumer, and less about any initiative from the company. However, there are significant advantages, with associated risks, for any company that is willing to adopt BYOD policies.


Topics: Multi-Factor Authentication

The Benefits of Responsibility Separation for MSPs

Posted by Tom Rizzo on Feb 25, 2016 7:30:00 AM


Because so many companies need a fair amount of outside help to get all of their work done, Managed Service Providers (MSPs) are continually taking on new clients. The business world never operates without problems, and when issues do arise, it is essential that the MSP already has a detailed list of defined responsibilities firmly in place. This will help to separate accountability between the provider and the client and help resolve exactly who is at fault for any security breach or other significant problem.We are going to discuss 5 benefits of separating the responsibility roles between an MSP and their client. 


Topics: MSPs

The True Cost of a Password.

Posted by Tom Rizzo on Feb 16, 2016 11:00:00 AM


Studies indicate that a breach in data security can cost between $100 and $300 for each record that is breached or lost. Part of the cost includes legal fees, lost productivity from the workforce, regulatory fines, and call-center costs. However, the cost to the reputation of the company in the eyes of customers is almost immeasurable. The worst part about all of this is that typically, the breach of data in most businesses is a result of a poorly secured password. In other words, the breach is preventable.


Topics: Password Management Best Practices

10 Signs You Need Two-Factor Authentication

Posted by Tom Rizzo on Feb 4, 2016 7:30:00 AM

Image Source: Ireland 2009, Cahir Castle Portcullis

Multi-factor authentication has been utilized in a variety of ways for millenniums. Many centurions would not allow strangers to gain access through security checkpoints without revealing the secret code. Additional multi-factor authentication methods included the ability of one person to recognize another individual as a method of providing a credential to gain access. In the world of computer accessibility, multi-factor authentication has long been recognized as the premier way of providing an additional layer of safeguarding to gain access into accounts.


Topics: Multi-Factor Authentication

HIPAA: Help your users become HIPAA Compliant

Posted by Tom Rizzo on Feb 2, 2016 7:30:00 AM


In January 2013, the United States Department of Health and Human Services (HHS) issued their new omnibus rule that governs the protection of patient personal health information.


Topics: Healthcare IT

Top 10 Ways to Keep Your Data Secure in PSAs.

Posted by Tom Rizzo on Jan 27, 2016 7:36:14 AM


PSA platforms offer valuable assistance to professionals and IT consultants in their ability to find solutions when managing projects. A PSA (professional services automation) system provides crucial effective tools at every level of the project from prospective selling to delivery, and even after-delivery solutions. The entire platform is designed to create an open environment for everyone within the system to gain access to crucial data. This helps the management to maintain the finances, workforce, scheduling, time and expenses, and every key component to managing and delivering the project on time.


Topics: IT Security