Category Archives: Cloud Computing

When Making Your New Year’s Resolutions, Don’t Forget Your InfoSec Resolutions

There are the common New Year’s resolutions like unplugging more often, planning more vacations or staycations, reading more books, writing a book, and losing weight. But, in today’s connected and always plugged in world, it’s easy to ignore technology. So, … Continue reading

Posted in Business Process, BYOD, Cloud Computing, corporate data, Cybersecurity, Data Breach, data protection, Data Security, Disaster Recovery, Management and Technology, Network Security, Online Security, Tech Equipment | Tagged , , , , | Leave a comment

Does Your Business Offer Mobile Payments?

There are many ways that your business can stand out. Your brand can have a unique name, think Google, Zappos, or Amazon. You can create a new way to provide your product and inject innovation into a stagnant industry, think … Continue reading

Posted in Cloud Computing, Cybersecurity, Internet of Things, Mobile Computing, Online Security, Tech Equipment | Tagged , , | Leave a comment

Does Your Business Think Like A Tech Company?

How often does your business stand out from the competition? Is your business an industry leader or just one among dozens or even hundreds in your industry? Does your leadership team dream of being the Google, Microsoft, Apple, or Amazon … Continue reading

Posted in Big Data, Business Process, Cloud Computing, corporate data, Management and Technology | Tagged , , | Leave a comment

How to Make Sure Your Brand Is Not #1 When It Comes to Cybersecurity Breaches

According to a recent post in NetworkWorld by Maria Korolov, the Massachusetts Institute of Technology (MIT) scored at the bottom in a cybersecurity survey of 485 large colleges and universities. For a prestigious university known internationally for producing talented individuals … Continue reading

Posted in Cloud Computing, corporate data, Cybersecurity, Data Breach, data protection, Data Security, Disaster Recovery, Email, Management and Technology, Network Security | Tagged , , , , | Leave a comment

Does Your Business Have a Cloud Computing Usage Policy?

Many businesses have a Bring Your Own Device (BYOD) to Work policy, a risk management policy, and some businesses are even tech-savvy enough to have a social media policy. Some businesses go one step further and introduce and review all … Continue reading

Posted in Business Process, BYOD, Cloud Computing, Cybersecurity, Data Breach, data protection, Data Security, Management and Technology, Network Security, Telecommuting | Tagged , , , | Leave a comment

The Managed Service Provider (MSP) Quandary: They’re Only as Good as You Allow Them to Be

When I hear of managed service providers (MSPs), I think of services in a compartmentalized box or a box of Legos. While that may be a simplistic view of what a MSP is, it actually fits because that’s how companies … Continue reading

Posted in Business Process, Cloud Computing, corporate data, Data Breach, data protection, Data Security, MSP, Network Security | Tagged , , , | Leave a comment

5 Must-Ask Questions Before Adding the Cloud to Your Infrastructure

In a previous post, I asked, “Is Your Business Ready for the Cloud?” Five key issues were detailed to assist midsize businesses before making the decision to move to the cloud. But once your leadership and IT teams make the … Continue reading

Posted in Cloud Computing, corporate data, Data Breach, data protection, Data Security | Tagged , , , | Leave a comment

Cloud vs. Mobile: Can They Co-Exist?

IBM recently published an Infographic featuring the following statistics: “68% of top CISOs and security leaders see security in the cloud and data privacy as a critical business concern yet 76% are worried about the theft of mobile devices and … Continue reading

Posted in BYOD, Cloud Computing, Data Security, Mobile Computing | Tagged , , , , | 2 Comments

Top 10 Tips to Share with Employees During Cyber Security Awareness Month (#NCSAM)

There is no dispute that data breaches are becoming more common, and as a result, online safety and the protection of personally identifiable information (PII) are hot topics in the mainstream media. Therefore, the month of October presents an excellent … Continue reading

Posted in Business Process, BYOD, Cloud Computing, Cybersecurity, Data Security, Disaster Recovery, Management and Technology, Mobile Computing, Network Security, Social Media | Tagged , , | 2 Comments

Is Your Business Ready for the Cloud?

These days, wherever you go, there’s always someone extolling the virtues of cloud computing. How often has someone at your monthly C-Suite meeting said, “Cloud computing is the answer to XYZ?” But then the conversation takes an unintended turn, and … Continue reading

Posted in Business Process, Cloud Computing, Data Security, Network Security, Telecommuting | 1 Comment