FOCUS on TECH – You live in an insecure environment

FOCUS on TECH - You live in an insecure environment

What does the CyberSpace Solarium Commission have to do with your daily work environment?

On June 2, 2020 the CyberSpace Solarium Commission released a white paper on "Cybersecurity Lessons from the Pandemic". Jeff Dettloff does a great job translating what this means for YOU in your daily life.

Reboot your Computer!

“Did you turn it off and on again?," quips a tech from the show 'The IT Crowd' as one of their recurring punch-lines.

That’s a question that gets asked a lot by IT professionals, so much so that the concept gets joked about, not only regarding computers, but in other areas of life as well.

#QuarantineReady – Work from Home Tool Kit

Unexpected changes can be challenging to manage. If you are finding the transition into social distancing and remote work hard to navigate, we've collected some resources and tools that you may find useful during these times. As always, you can call upon our team to start #makingtecheasy for YOU.

Remote Toolkit

Resources:
• LinkedIn Learning – LinkedIn Learning has a whole series dedicated to Work from Home.

Is your organization #QuarantineReady ?

Is your organization #QuarantineReady ?

Here are six questions to ask yourself (or those in your organization) to help guide you towards the best ways to become #QuarantineReady for your organization.

What systems are so vital to the business that access needs to be available at all times and from any location?
Where are your files and/or database(s)? Can they be securely accessed from a remote location?
Communication systems - can your phones, email, etc be securely accessed without someone on-site administering their operations?
Accounting - can you run your business securely and successfully without local access to accounting/ERP systems?
What Internet service is available at the remote location - is it fast enough for the user to do their job without frustration? 
For all of the above, what steps are you taking to ensure that they are operationally secure? Cyber-Security is ultimately a human behavior problem much more than it is purely a technology problem.