Happy Data Privacy Day!

Data Privacy Day may not be a holiday for your IT Support Professional, however, it is an international holiday dedicated to education about Data Privacy. On this day many private, government and academic Data Privacy and IT Security Professionals get together and discuss key issues about Data Privacy. What is Privacy Data and What Does This Mean to Your Business? Privacy Data can include a combination of Name, Address, Birthday and Taxpayer information. It can also include other information you may have related to employee health records, personnel records, customer data, supplier data and more. Keeping this data protected and secure from data leaks and hackers is important. You may face fines, suffer damages, loss of reputation and even loss of revenue if Privacy Data is leaked from your company. What Can You Do on Data Privacy Day to Protect Your Business? It is important to educate your employees about Privacy Data and the Risk of Loss. In today’s world where social networking is acceptable in many workplaces, employees may not realize the risks of sharing Privacy Information. The more your employees are aware of Privacy Data and the Risk of Loss the better. How Can I Protect Privacy Data on My Company Network on Data Privacy Day? It is important to keep you systems in compliance with O/S Patches, as well as, up to date with the latest Anti-virus and Anti-malware definitions. It is also a good idea to monitor your network for unauthorized access. You should also maintain a current backup of all of your privacy data. If you have a data leak you may be required...

2013 IT Trends

2013 IT Trends There are a number of driving factors that will influence 2013 IT trends. These trends include Mobility, Cloud Computing, Disaster Recovery and IT Security. These 2013 IT trends will influence IT budgets and plans, while enabling companies to take advantage of mobile computing, enterprise infrastructure, software as a service (SaaS), social networks and more. Here are some predictions for 2013. Mobility A top  2013 IT Trend is Mobility.  Mobility and mobile device management go hand in hand. Most IT industry analysts agree market growth of smartphones and tablet computers will outpace PCs in 2013. The IT Industry research firm IDC is now projecting that 172.4 million tablets will ship in 2013. Mary Meeker, former internet analyst turned venture capitalist noted 24% of Black Friday shopping occurred on a smartphone or tablet in 2012. Microsoft also hopes to get a large share of the tablet PC market with its recent release of Microsoft Windows 8 RT Tablet. This trend in mobility will drive the greater need for Mobile Device Management and mobile security as more corporate data will reside on and be accessed by mobile devices than ever before. Cloud Computing Another 2013 IT Trend is Cloud Computing.  In 2012 many companies turned to the cloud to access enterprise class infrastructure, remote support, online backup and software as a service (SaaS) for critical applications, such as email, sales force automation (SFA) and customer relationship management (CRM). Expect additional growth in cloud adoption from managed security solutions for anti-virus and anti-malware protection, as well as other data protection services. IT research firm Gartner predicts by 2015 ten percent...

Apple to Begin Shipment of iPad Mini Tablets

Apple to Begin Shipment of iPad Mini Tablets Apple Computer announced their newest tablet computer, the Apple iPad Mini  on November 2nd. Expect the Apple iPad Mini with WiFi with Cellular LTE support to begin shipping sometime this week. The Apple iPad Mini joins a variety of choices in tablet computing including Microsoft Windows RT Tablets, Google Android Tablets and the family of Apple iPads. Tablet computers are one of the fastest growing segments of PCs, so it is no surprise there is a wide range of choices. Here are some things you should consider when purchasing a tablet computer for your business. What is the intended business use of the tablet computer? Tablets are great for taking notes during meetings, one on one sales presentations, collecting data in the field, accessing patient information in the examination room and a variety of other tasks where the user is standing or sitting without a desk. Think twice if you expect your tablet to replace a desktop or laptop computer. For example, laptops are great for working on an airplane or taking work home or on the road. Don’t make your decision for a tablet computer as an “either/or” decision. Consider the business requirements the tablet computer will fill. Do I have a policy for handling corporate data on a tablet computer? One consideration when purchasing tablet computers is that they are more vulnerable to theft and/or loss. You should take precautions to ensure you have the ability to wipe corporate data from the device if it is lost or stolen. How will your business back up data from tablets? Employees...

IT Security Assesment

IT Security Assessment An IT Security Assessment is a great way to take an inventory of what your needs are in IT Security. Whether you must comply with regulatory requirements, including HIPAA and PCI, or are concerned about your IT Security, consider an IT Security Assessment as a starting point to see how your company is protected today. If you perform an IT Security Self Assessment, the Computer Technology Industry Association, CompTIA recommends you ask yourself some of the following questions: Data Types and Storage Do you store Private Health Information (e.g. HR records). If so, how many records? Do you store Personal Financial Information (e.g. SSN, date of birth, account Information, banking information). How many records? Do you store credit card data? How many records? What is the nature of your confidential intellectual property? Where do you do business – state, national, international? Where are backup devices (tapes, drives) stored? In a secured area? Company Information What is your tolerance for downtime (for the most critical applications)? Do you carry breach insurance? Do you carry liability insurance? Have you had a breach in the past three years? If so, what were the consequences? Security Processes Do you have written security policies and procedures? Do you perform internal audits? How often? Do you perform external audits? How often? Do you perform vulnerability checks? How often? Do you regularly review policies and procedures? Do you have an incident response plan? Do you have employees working from home? Do you have encrypted hard drives? Removable media? Do you control and log privileged access? Do you have a mobile device strategy? These...

IT Security Assessment

IT Security Assessment An IT Security Assessment is a great way to take an inventory of what your needs are in IT Security. Whether you must comply with regulatory requirements, including HIPAA and PCI, or are concerned about your IT Security, consider an IT Security Assessment as a starting point to see how your company is protected today. If you perform an IT Security Self Assessment, the Computer Technology Industry Association, CompTIA recommends you ask yourself some of the following questions: Data Types and Storage Do you store Private Health Information (e.g. HR records). If so, how many records? Do you store Personal Financial Information (e.g. SSN, date of birth, account Information, banking information). How many records? Do you store credit card data? How many records? What is the nature of your confidential intellectual property? Where do you do business – state, national, international? Where are backup devices (tapes, drives) stored? In a secured area? Company Information What is your tolerance for downtime (for the most critical applications)? Do you carry breach insurance? Do you carry liability insurance? Have you had a breach in the past three years? If so, what were the consequences? Security Processes Do you have written security policies and procedures? Do you perform internal audits? How often? Do you perform external audits? How often? Do you perform vulnerability checks? How often? Do you regularly review policies and procedures? Do you have an incident response plan? Do you have employees working from home? Do you have encrypted hard drives? Removable media? Do you control and log privileged access? Do you have a mobile device strategy? These...
Skip to content