Insider Advice About the Computer Systems Your Business Relies Upon

15 Must-Dos to Protect Your Business from a Cyber Attack

Posted by Bob Martin on Thu, Oct, 11, 2018 @ 10:10 AM

Cybersecurity is more critical now than ever. Those seeking to access your information are constantly upping their game. Whether they enter with brute force via a DDoS (Distributed Denial of Service) attack or slip in through the backdoor with a simple malware-laden phishing email, you need to be prepared. What can you do to prevent data loss and downtime? 

Read More

Tags: Cyber Security, Network Security, IT security, Data Security

October is National Cybersecurity Awareness Month

Posted by Bob Martin on Wed, Oct, 03, 2018 @ 13:10 PM

October is National Cybersecurity Awareness Month (NCSAM). NCSAM is a collaborative effort between DHS and its public and private partners - including the National Cyber Security Alliance (NCSA) - to raise awareness about the vital role cybersecurity plays in the lives of U.S. citizens. At Great Lakes Computer, we understand the value of effective cybersecurity and are constantly adding new services to help our customers keep their data safe. 

Read More

Tags: Cyber Security, Security Operations Center as a Service, Network Security, IT security, Data Security

What are Managed IT Services?

Posted by Bob Martin on Thu, Sep, 27, 2018 @ 14:09 PM

Managed IT services are growing at a rapid rate, with a recent survey estimating that almost 69% of small to medium-sized businesses (SMBs) hire at least one type of IT service provider. So what are managed IT services, how do they work, and why would companies consider using them?

Read More

Tags: Managed IT Services, IT Managed Services, Managed Services

SOC-as-a-Service: What You Need to Know

Posted by Guest Post on Tue, Sep, 25, 2018 @ 09:09 AM

Today’s cyber criminals are clever, sophisticated, organized and typically determined to profit from the theft of sensitive data – by selling it on the dark web or by extorting organizations with ransomware and distributed denial-of-service bombardments.

Read More

Tags: SOCaaS, Security Operations Center as a Service, Data Security, Data Protection

Hurricanes and Hackers - Are You Disaster Ready?

Posted by Bob Martin on Tue, Sep, 11, 2018 @ 09:09 AM

Threats to your business come in many forms, from Hurricane Florence threatening the East coast to Harvey in Accounting opening an infected email. While there are many steps you can take to reduce your exposure, it's almost impossible to prevent disaster completely. Your best move is to have a response plan in place to help you recover as quickly as possible. And it just so happens to be National Preparedness Month, so we've got some tips to help you out. 

Read More

Tags: Disaster Recovery, SOCaaS

What the Three Little Pigs Can Teach Us about Cybersecurity

Posted by Bob Martin on Thu, Aug, 30, 2018 @ 12:08 PM

Last night, as I was putting my kids to bed, I read them the classic children’s story, “The Three Little Pigs”. And you know what it got me thinking about—cybersecurity.

Read More

Tags: Security Operations Center as a Service, SOCaaS, Cyber Security, Network Security, IT security, Data Security, Managed IT Services, Managed Services

Ohio Data Protection Act Just Passed. What Does It Mean for You?

Posted by Bob Martin on Wed, Aug, 22, 2018 @ 10:08 AM

Ohio legislatures just passed the Ohio Data Protection Act, which gives companies a safe harbor in the case of a data breach.  Companies that adhere to the NIST Cybersecurity Framework will be entitled to an affirmative defense to any cause of action sounding in tort that is brought under the laws of Ohio or in the courts of Ohio and that alleges that the failure to implement reasonable information security controls resulted in a data breach concerning personal information.

For your business that means if you take steps to protect your data, you may be protected from claims against you in event of a breach. 

Read More

Tags: Cyber Security, IT security, Data Security

Simple Solutions to Productivity Blockers

Posted by Bob Martin on Thu, Aug, 02, 2018 @ 09:08 AM

Technology makes our lives easier... most of the time.  But sometimes, getting that technology to work the way it should when it should takes more work than we'd like it to. How often have you been held up because your office printer is giving you error messages or failing to sync with your laptop? Ever lose data in a system crash? These hurdles can put a major dent in your productivity. Here are a few smart solutions to those productivity blockers. Make your technology work for you, not the other way around. 

Read More

Tags: Managed Services, Managed IT Services, IT Support, IT Managed Services, IT outsourcing, Managed Print Service, Cloud Computing

Legal Industry Late to the Cloud, But They're Coming.

Posted by Bob Martin on Wed, Aug, 01, 2018 @ 10:08 AM

In the early years, cloud computing was taken on by the innovators and early stage adopters. Then, as with any new tech, it spread to the mainstream. But, there are always the old guard. The ones distrustful of change. Those with the most to lose if adoption fails somehow. The legal, medical, and financial sectors are the last to the game. The fall out of a data loss or breach for each of them could be catastrophic. But, the technology continues to prove the business case. The cloud helps people work better, smarter. Here we outline the benefits many law offices are now enjoying by switching to the cloud. 

Read More

Tags: Cloud Computing, Network Security

Guest Wi-Fi - A Necessary Evil

Posted by Bob Martin on Tue, May, 29, 2018 @ 13:05 PM

The more windows and doors you put into a house, the more points of access a would-be intruder has. Your internet connection, your servers, your employees smartphones and laptops, and your Wi-Fi controlled thermostat are all windows into your data infrastructure. You do your best to control who can access these and inform them of the proper use of each. But then comes guest Wi-Fi, which can feel a lot like handing a stranger your spare key and hoping for the best. 

Read More

Tags: Cyber Security, Network Security, IT security, Data Security, WiFi

SUBSCRIBE TO THIS BLOG

Follow Us

Latest Posts

Topic Suggestions

submit-a-suggestion

Have a question that you don't see covered in our blog? 

Send us your topic, and we'll try to write on that subject in one of our next blog posts if there is enough general interest. 

For questions specific to your company, please phone one of our representatives at 800-899-4522.