CMMC Level 3 Webinar On-Demand

Join us today to get a clear picture of what Cybersecurity Maturity Model Certification (CMMC) means if you rely on DoD contracts to maintain your business. Joe Danaher, CISM, CRISC will answer questions and step you through what it means to your security program and budget to achieve CMMC Level 3: Good Cyber Hygiene. Get the latest updates from the DoD and clarify how the bar is being raised on cybersecurity for over 330,000 DoD subcontractors. The changes are necessary for the protection of America’s defense intelligence, but many companies

Would your business benefit from SD-WAN?

Are you a mid-market organization with multiple locations, multiple cloud services, and a complex network? If so, you would benefit from learning more about SD-WAN. In simple terms, what is SD-WAN? Software Defined Wide Area Network is a significant advancement in the technology of WANs.  The key to SD-WAN is the centralized control using a software application (Software-Defined).  Virtual networks are created on top of the hardware network. The main benefits our client seek are prioritizing their business application and better utilization of their internet connections. What Drives SD-WAN Adoption?

4 Tips On Keeping Your Cloud System Secure

In this day and age, businesses have become increasingly dependent on the cloud. There are a number of benefits to working through the cloud. For one thing, it’s easier to maintain a system through digitization rather than keeping all important information in hard copies and paper documentation. Furthermore, it’s often much less expensive to operate through the cloud, which essentially allows employees to multitask and safely store their information. But then, as with any storage system, the cloud has its drawbacks. As the cloud has become more prevalent, hackers and


WHY SHOULD YOU BUILD A CULTURE OF SECURITY AWARENESS? The risks to all businesses due to cybersecurity breaches are well-documented and they are growing.  Most experts advise businesses to plan for a breach due to the likelihood of an occurrence.  Your IT staff have likely also been asking for additional resources to help combat the very real threats of bad actors that want to steal your data.  As an owner or executive at your company, what is your role in all of this? The stakes are high and the threats

If You Connect It, Protect It

OCTOBER IS NATIONAL CYBERSECURITY AWARENESS MONTH #BECYBERSMART Top Tips from The National Cybersecurity Alliance. INTERNET OF THINGS Internet of Things (IoT) or smart devices refers to any object or device that is connected to the Internet. This rapidly expanding set of “things,” which can send and receive data, includes smartphones, cars, appliances, smartwatches, lighting, home assistants, home security, and more. #BeCyberSmart – connect with confidence and protect your interconnected world. WHY SHOULD WE CARE? Cars, appliances, wearables, lighting, healthcare, and home security all contain sensing devices that can talk to

Online Behavioral Tracking – The Good. The Bad. The Ugly.

We were was recently asked about the threat to privacy and businesses based on online behavioral tracking technology.  While this has been around for many years, the sophistication of targeted advertising online has grown, yet, it is still not at a “Minority Report” level.  The first step in understanding the threat is to understand the technology.  Online behavioral tracking is a product of technologies built-in to web pages and web browsers that work silently in the background as you use the internet. Cookies and Online Behavioral Tracking Coding, called “cookies”,

Managing Backups of Your Data

VICTOR IS A SYSTEMS ENGINEER AT THE AME GROUP, MANAGING BACKUPS FOR OUR CLIENTS AND OUR OWN!  WE ASKED HIM, WHAT IS IMPORTANT TO KNOW ABOUT BACKUPS AND RECOVERY? Backups are something everyone wishes they had when technology goes south. Like the insurance policy, you didn’t size right or bother to purchase. The need for backups AND reliable data recovery is becoming the number one priority for many businesses, and it should be. Even hard drive companies are starting to build data recovery services into their warranties and obviously at

Keep Up With Software Updates

Most everyone understands application software updates. We do it all the time with our phone apps, and most have seen a notification to update your computer operating system. They often give us new features, but, more importantly, they improve security. Software Updates / Patches Software updates are also known as “patches”. Think of them as patching holes in the software code to prevent cybercriminals from taking advantage of vulnerabilities and infiltrating your network. When software vendors find vulnerabilities (holes) in their software, they create new code to repair them. When

Security and Disaster Recovery: What You Need to Know

Outsourcing IT is a wise business choice, especially for the small business owner. But make the wrong choice and you just ramped up the security threat to your network. A lot of small business owners choose their outsourcing based on price alone, which can be a critical error. Network security threats are unlike physical security threats. There are literally threats around every corner in the cyber world. You have groups that are dedicated to hacking into networks and causing chaos as a pastime. Data security management for business has to

Think Before You Click

National Cybersecurity Awareness Month To reduce your risk of falling for a phishing scam, Think Before You Click! Start to look at emails from a new perspective Look at the email address Even if it is from a name you recognize, Think Before You Click! <> – Most business emails do not come from a GMAIL account – be suspicious. <> – Perhaps there is a spelling error that can easily be overlooked if rushing – be suspicious. TIP – on a phone email app, you don’t always see the