As technology gets more complex and ingrained into our lives, studies have shown consumers are increasingly feeling overwhelmed about how to protect themselves. Since criminals are getting more sophisticated, we have to as well, right? Not so. The reason we feel overwhelmed isn’t always because of the levels we have to go to in order to protect ourselves, it’s because we have more devices we need to protect. Most consumers trust that the IoT products they buy are being built with security …

How are you fighting Shadow IT?

Posted on November 9, 2016 by

If you’ve found yourself pulling your hair out over Shadow IT, you’re certainly not alone. But there’s no need to stress yourself to death! Here’s why all is not lost if you’re struggling with aligning your IT department with other LOBs: Shadow IT brings to the forefront the very real problem of control vs consumption. If you’re attempting a traditional control-based approach to governing the applications other departments in your business use, take a step back and consider your operation …

Note: This is the second in a series on Shadow IT. In this post, we’re talking about the differences in IT operational models that could lead to Shadow IT in businesses. The way things are now, IT’s speed of change is unable to meet its business’s speed of need, which leads to Shadow IT. Why? Because IT has traditionally been a control-based model, whereas a line of business is adapting and/or moving to a consumption-based model. Let’s review how each …

The White House has a new campaign to raise awareness as part of Cyber Security Awareness Month. One of those campaigns is called “Lock Down Your Login,” which aims to educate users on the security benefits of two-factor authentication for their personal online accounts. According to campaign leaders, two-factor authentication “could have prevented as many as 62 percent of successful data breaches last year.” What is two-factor authentication? Two-factor authentication serves as an extra layer of security beyond the usual …

Note: This is the first in a series of posts talking about Shadow IT, why it exists, and how to mitigate it within an organization. Shadow IT has been talked about amongst CIOs, but according to Oracle, we still aren’t paying enough attention. Why is that? There are many factors, but the big one CIOs might not be willing to face is the problem of goal orientation between the IT department and the rest of the business: They just don’t …

Many major internet sites were slow or entirely downed on Friday thanks to at least two Distributed Denial of Service attacks, according to Engadget. The first attack came Friday morning at 7:10 a.m. and affected Dyn, one of the major domain name systems of the internet. Affected sites included Twitter, Spotify, Reddit and The New York Times. Dyn claimed to have everything back up and running, but another attack hit at about 12 p.m., causing Twitter to shut down entirely …

How to avoid spear phishing bait

Posted on September 14, 2016 by

In the war against cybercriminals, we’ve learned to block messages from people we don’t know and avoid emails that have an excessive amount of capital letters, exclamation points and bad spelling. We’ve also generally recognized that we sadly haven’t come into a large fortune from a Nigerian prince if we just send him our financial information and a little bit of money. But what if the email is from someone you know, with their email address, a normal-sounding subject line, …

Recently, Yan Ness and Bill Frohriep of Online Tech held a thought leadership event with a dozen business and IT executives at the Grosse Pointe Yacht Club. The main topic on the agenda was Shadow IT, or “IT behind the scenes.” Shadow IT refers to companies who implement IT projects without the department’s knowledge (or permission, in some cases), usually because the internal IT department is too slow or doesn’t have enough resources to respond to requests. An example of …

Ransomware has been rising at an “alarming rate,” according to security researchers, with a 3,500 percent increase in criminal use of net infrastructure that helps run ransomware campaigns. According to Microsoft, the U.S. has the highest number of ransomware attacks, with more than 300,000. It can affect anyone with a computer or mobile device, and there are already plenty of examples of large businesses, especially healthcare, being victimized and shelling out large amounts of money to get their data back. How does …

Get started now. Exceptional service awaits.

Live Chat