Why hackers target you through IoT, how to spot a breach and how to protect yourself

IoT

In our most recent post, I walked you through the promise of the Internet of Things (IoT) from a consumer perspective before relaying a seemingly crazy anecdote about the increasingly creative (and nefarious) ways hackers are using IoT devices as access points to otherwise secure networks safeguarding sensitive data. It’s an important first step — recognizing IoT as the vulnerability … Read More

IoT does some pretty awesome stuff… and opens you up to all kinds of risk

IoT

The Internet of Things (IoT) has been on the horizon for years —  in some ways, decades even. From fictional depictions as far back as the Jetsons to the promise of a smart home with intuitive tech that not only responds to your every command but can anticipate all your needs, it’s been a tantalizing frontier in consumer electronics for … Read More

The Cloud is NOT for Everyone

The cloud concept has a lot of momentum lately, but it’s not the right solution for everyone.  So what determines if the cloud is right for you?  There are a few key characteristics of your business that will push you towards a cloud implementation.  How far you go is determined by your need for those characteristics.  The important thing to … Read More

Proactive Service vs Reactive Support

When we talk with business leaders we often hear about their perception of Proactive Service vs Reactive Support.  Many business have been told that Proactive Support includes things like patch updates, anti-virus checks, computer monitoring, and so on.  While you can consider these items to be proactive in nature, doing them independently doesn’t offer much value to the end result … Read More

Technology Pain Threshold

I’m always surprised by the difference in pain thresholds between companies.  One company will put up with all sort of terrible atrocities in their infrastructure and never say a word.  Another company will raise hell the moment a printer doesn’t work.  I suppose this is a matter of culture, but what is that actual impact on the business?  The Emerson-Ponemon … Read More

The Leverage Service Experience

The Leverage Service Experience is unique.  It’s like the feeling you get when you go home for Thanksgiving.  You don’t use it everyday, but when you do it feels comfortable and familiar.  The person you talk to knows who you are and what you like.  They know how you like to be treated and how you want your computer to … Read More

9.5 Remote Worker Requirements

More people than ever are working away from the office.  The modern employee expects the ability to perform her entire list of job duties from anywhere.  As an employer, it’s a competitive advantage in your market for acquiring business and top talent.  As with any new technology it comes with some risks.  You must account for the security requirements first … Read More

Cloud Computing: The MSP Advantage

It’s no secret that cloud computing is the future of computer and network care for businesses worldwide. “The cloud” eliminates the need to have physical servers and hardware in your office. Cloud computing focuses on maximizing the effectiveness of the company’s shared resources, as well as being effective in heightening companies’ day to day tasks with multiple users. It is … Read More