Blog

What to Expect from a Managed IT Service Provider

What Are HTTP Cookies, and Do I Need to Allow Them?

What are HTTP cookies and do you need to allow them?

Wondering why you keep being asked to allow cookies when you browse the Internet? Here’s the answer you’ve been looking for. You’ve probably heard of HTTP cookies (also known as “web cookies,” “browser cookies,” or simply “cookies”) before. Maybe you’ve visited a website and had it ask you for permission to use cookies and wondered… read more

How to Identify the Top 4 Online Security Scams

How to identify the most common online security scams.

Scams are becoming more dangerous and harder to spot. Here’s what to look for. Over the past few years, the public has grown more educated in the tactics used by online scammers. Doubtless, this is due to the rise in security breaches in prominent businesses and the surrounding publicity. With the news coverage surrounding these… read more

Why Segregation of Duties is Crucial for IT Security

Why Segregation of Duties is Crucial for IT Security

How to create checks and balances when organizing your IT network. When many people think about IT security, the first things that come to mind are programs such as firewalls or malware detection software. However, security is as much about the organization systems and process your company has in place as anything else. Of those… read more

GSA Begins Process of Aligning Contracts with NIST 800-171

GSA Begins Process of Aligning Contracts with NIST 800-171

It’s been assumed for some time now that major components of the government contracting sector would fall in line with NIST standards for safeguarding controlled unclassified information (CUI), namely NIST Special Publication 800-171. Department of Defense was the first to implement the standard, beginning with updates to the Defense Federal Acquisition System (DFARS) contract regulations… read more

Understanding TPISR – The Automotive Industry’s Big Shift towards Information Security

Understanding TPISR - Automotives Big Shift towards Information Security

During the 2017 AIAG Supply Chain Summit, the formation of a new working group tasked with creating a set of information security standards was announced. These standards would be created for use by the OEM’s third-party suppliers and partners, and center around protecting OEM intellectual property during contract fulfillment. Five OEM’s participated in the working… read more

Why Your Small Business Needs Managed Firewall Support

cloud and shield representing a managed firewall service

Firewalls are a crucial line of defense protecting your business from cyberattack. If you own a computer, you probably have some familiarity with using a firewall. At the very least, you’ve probably heard about them and understand that they are important for your computer’s safety. Firewalls block unauthorized access to your computer network by viruses,… read more