Laboratory or Museum?

Laboratories are dynamic. New instruments are added regularly to enable new tests. Space is reconfigured to adapt to new ways of doing things. Once something is no longer useful, it is removed and replaced with something better. Museums are static. Their purpose is to preserve the past. Even when new exhibits are added, they look backward, not forward. Read more

“How Could You Let This Happen?”

Those are words we never want to hear, no matter what the situation. Something undesirable has happened, we were expected to have prevented it, but it happened. By the time the question is being asked, there isn’t much to do except damage control.

When it comes to information security, sadly, this question is asked all too frequently. Attackers continue to refine their skills while, at the same time, more and more aspects of business are being digitized and moved online. If you don’t have a robust and constantly improving security posture, sooner or later you’re going to hear those words directed at you.

In the previous blog post, Make vs. Buy, we discussed the economic tradeoffs of investing in internal expertise versus leveraging external expertise. Maintaining effective information security is like running on a treadmill that doesn’t have a stop button…if you aren’t constantly moving forward it’s going to get ugly real fast. Staying up to date on the latest security trends, vulnerabilities, and solutions is a full-time job, and when you factor in PCs, phones, servers, networking gear, and other technologies, more than just one person can handle.

Read more

Make vs. Buy

If you’ve taken a class or read a book on business strategy, you’ve likely come across the “outsourcing decision”. In this decision, a business compares the costs and benefits of producing a part or service internally versus the costs and benefits of paying someone externally to do it. For this decision to be accurate, all the associated costs and benefits need to be factored in. One of the hardest variables is the opportunity cost – what new product or service can my business not develop because it’s busy working on something else? Read more

Halt 70% of Known Network Cyberattacks and Phishing Campaigns

As the shelter-in-place (SIP) rages on within California, the Bay Area and its workers are forced to continue working remotely. At times, it feels like our world has drastically changed. Despite how mixed up everything may seem, it appears to be business as usual for robocalls, scammers, and hackers.

Known to the cybersecurity landscape as a “lateral movement” or “lateral attack,” the breach and move attack method has become a favorite for hackers today. These attacks will typically target business supply chains, in hopes of gaining access to their desired end target. One of the more famous lateral attacks was in 2013 when the department store Target was breached by hackers. The hackers were able to infiltrate Target’s HVAC System Software. From there they were able to travel within the network and steal credit card data from unknowing customers. Read more

3 Major Reasons Your Business Should Move to Office 2019

Microsoft Office 2010 support is now reaching the final leg of its lifecycle. Extended support for Office 2010 will end on October 13th, 2020 and that means no more tech support, bug fixes, or security patches coming from Microsoft. Accompanying applications, Microsoft Exchange 2010, and SharePoint Server 2010, will also reach end of life. This will leave your business vulnerable to cyber-attacks and hackers if you do not update these applications.

Businesses are looking into their options: upgrading to the on-premise Office 2019 version for a one-time purchase or moving to the per-user cloud-based subscription of Office 365. Read more