Downloads

  1. Cyber-threats In 2016: Evolution, Potential, And Overcoming Them
    6/29/2016

    The contemporary business environment is essentially a small subsystem in the larger cyber world. Every enterprise, no matter how technically progressive or apprehensive about technology, is connected to and handles different streams of data. The current IT landscape is highly disruptive, but it does promise better business outcomes for those who are Internet of Things (IoT) ready and prepared to embrace Big Data. However, there are some apprehensions about this more connected, omnipresent, and easily accessible data — it opens many doors to hackers, creating room for Cyber threats to seep in.

  2. Trunk Slammers Vs. Strategic Partners
    6/28/2016

    Trunk slammers are the bane of the security industry. They’re the folks who pick up jobs installing surveillance systems without really knowing what they’re doing. But when the system doesn’t work right, the customer blames the product rather than the installer. And that gives the whole industry a bad name.

  3. Why The Time Is Right For The Global Telecom Industry To Engage MSPs
    6/28/2016

    According to Gartner’s 2016 CIO Agenda Survey, CIOs expect digital revenues to grow from 16 to 37 percent in the next five years, and public-sector CIOs predict a rise from 42 to 77 percent in digital processes. What this means is — with very few exceptions — businesses of all types are feeling the impact of consumer demand for digital services, and are looking to digital to extend the way their business interacts with its consumers.

  4. Cyber-Security’s Weakest Link: People
    6/27/2016

    A stark reality facing today’s businesses is the never-ending threat to cyber-security and a strategy for how to combat it. An even greater concern is damage to corporate image, consumer trust, loss of revenue, liability to customers, and the ever-increasing statutes imposed by lawmakers and agencies who point the finger at businesses for failure to take responsibility for preventing data theft.

  5. Protect Yourself From Cybercrime: 6 More Best Practices To Implement Now
    6/27/2016

    As discussed in Part 1, most companies have by now at least a basic awareness of the need to take action to reduce their vulnerability to cybercrime and to prepare for the possibility that they will suffer a cyberattack. In that article, we outlined six of our 12 best practices for addressing and responding to cyber risks. In Part 2, we will discuss the remaining six.

  6. Prepare For The 4 D’s: A Business Legacy Conversation
    6/27/2016

    Part of planning and preparation means being ready for the unexpected. There are four D’s that can drastically reduce the value of a company.  It is true for a sole owner, but obviously the likelihood increases with more people involved.

  7. Bringing Google Home To Work
    6/24/2016

    While Amazon Echo has steadily gained popularity over the last two years, the upcoming launch of Google Home will likely propel the adoption of smart devices even further in the home. And why not?

  8. Preparing For The Unexpected
    6/24/2016

    Dear? Is that a deer?  Legacy Planning – Preparing for the Unexpected.  What to do now?

  9. Exploiting Windows Vulnerabilities Shows No Sign Of Slowing: The 6 Major Threats To Watch
    6/24/2016

    Recently, I wrote about the continuing threat Windows users face. Despite the major advances Microsoft has made in terms of increased security safeguards available in the latest release, Windows 10, there are millions of PCs still running older versions of the popular operating system which are highly vulnerable and susceptible to external threats. Of the many flavors of Windows still widely used, Windows 7 remains the most popular version of the operating system and where cyber criminals continue to focus much of their efforts.

  10. PCI QIR Q&A With Visa
    6/23/2016

    Much of the talk around the proverbial POS Industry “water cooler” has been around the now more than six month old announcement about the new Visa requirement for all Level 4 merchants. As a refresher: the card brand is requiring that merchants in this tier must use only PCI QIR professionals for POS application and terminal installation and integration. This requirement will go into effect in January 2017. It marks Visa’s effort, in their words, to establish requirements “for acquirers to ensure their small merchants are taking steps to secure their payment environment.”