In this day and age, employees are more connected and more mobile than ever. The hybrid workplace is here to stay, and for employees, this means relying on connected devices from their home office setups. According to recent data, smart home systems are set to rise to a market value of $157 billion by 2023,…
What is Amazon Sidewalk? If you have an Amazon Echo smart speaker or Ring home security device, a new feature called Sidewalk will be introduced on June 8th. According to Amazon, Sidewalk is “a neighborhood network designed to make your devices work better—both inside your home and beyond the front door. Operated by Amazon at…
On May 12, 2021, President Joe Biden signed an executive order to bolster the nation’s cyber security efforts. This order comes days after the significant ransomware attack on the Colonial Pipeline, an incident which slowed fuel distribution along the eastern coast, led to en masse rushes to the pumps, and cost Colonial Pipeline nearly $5…
By now, you’ve probably heard about the major data breach that involved millions of Facebook user accounts. As one of the most popular social media platforms, you may be wondering if you’re one of the victims. In this blog post, we’ll tell you how to check if you’ve been hacked, what to do if you…
The notable rise in unemployment last year has put some in our local region at risk after a data breach at the Vermont Department of Labor (VDOL). The mix-up resulted in over 40,000 1099-G tax forms, containing Social Security numbers and other personally identifiable information, being addressed and sent to the wrong recipients. This breach…
Earlier this month, more than 3.2 billion unique unencrypted email and password combinations were released on a popular hacking forum. This COMB, or Compilation of Many Breaches, contains data from a number of previous breaches including Netflix, LinkedIn, Yahoo, Hotmail, and many others. To put the enormity of this breach into perspective, there are approximately…
What is a WISP? A Written Information Security Policy, or WISP, details policies and procedures for protecting your company’s confidential data, assessing how it’s being protected, and identifying who is ensuring it’s protected. A WISP proactively plans for the “what ifs” and is fundamental to your organization’s security. Administrative, technical, and physical safeguards are defined…
A Virtual Chief Information Officer (vCIO) is an outsourced technology pro. A vCIO’s services are available at a fraction of the cost of an in-house CIO and transcend traditional IT support by not only managing your technology infrastructure but also: Analyzing your current IT to identify gaps and unnecessary expenditures. Aligning your business and technology…
As we bid farewell to the chaotic and unpredictable year that was 2020, now is the perfect time to ensure your cyber security practices are up to par. These 5 easy tech resolutions will make your business more productive, successful, and secure. 1. Clean up your passwords We know we sound like a broken record…
It’s the most wonderful time of the year! Cookies are baking, snow is falling, and there’s a hint of magic in the air. There’s also a mad frenzy to try to get the perfect presents for everyone on your list from Great Aunt Martha to Sam the Postman. With most holiday shopping taking place online…
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.