Online Security Tips for Small Businesses

Online Security Tips for Small Businesses Your business’ online security is something you need to take seriously. This isn’t only true for large businesses, but small and medium sized businesses as well. This is because you will be held liable if your network is compromised and data is seized.  We want to discuss online security

Man working on Data Backup Server

Data Backup and Disaster Recovery: Why It’s Important For Your Business

Data Backup and Disaster Recovery: Why It’s Important For Your Business For many businesses, especially service related businesses, their most valuable asset is their data.  If you cannot access your data, then you won’t be able to serve your customers in a timely manner and your customer service will take a hit.  This results in

City of Atlanta Cyber Attack

Why You Need an Intrusion Prevention System (IPS) on Your Server

Why You Need an Intrusion Prevention System (IPS) on Your Server In recent posts, we’ve discussed the importance of an Intrusion Prevention System (IPS) as opposed to simply an Intrusion Detection System (IDS).  The IDS simply detects a cyber attack, whereas an IPS takes this to the next level and PREVENTS an attack by taking

Why you need an Intrusion Prevention System (IPS) on your Network

Why you need an Intrusion Prevention System (IPS) on your Network In our recent post, we discussed the history and evolution from an Intrusion Detection System to an Intrusion Prevention System, specifically as it relates to your workstations.  Let’s get even more secure by talking about an Intrusion Prevention System on your Network. Additional Layer

Why you need an Intrusion Prevention System (IPS) on your Workstation

Why you need an Intrusion Prevention System (IPS) on your Workstation Evolution to Intrusion Prevention Systems Intrusion Prevention Systems (IPS) are the new evolution of what was once an Intrusion Detection System. Intrusion Detection Systems detected a cyber attack happening and would alert the IT department or Information Security Department in order for them to