by northlightit | Jan 29, 2019 | Blog
Selling stolen IDs and other personal data is a lucrative trade for hackers. They are always looking for sources where vital information is stored. As a small to midsize business you store your client’s personal information, collected from different sources, on...
by northlightit | Jan 22, 2019 | Blog
There are many threats to the integrity of a small business, and not all of them are as dramatic as a cyberattack or a hurricane. Every small business needs to do a risk assessment to determine all the threats that exist that could bring harm. External threats are the...
by northlightit | Jan 15, 2019 | Blog
BYOD refers to a firm’s policy of allowing employees to use their own personal phones, tablets and laptops for all their work applications.This is a pretty common policy, and it has many benefits, but it brings along risks. How are you addressing these...
by northlightit | Jan 8, 2019 | Blog
Are you under the impression that data loss is all about putting up firewalls to protect against evil cyberattacks? Some of the biggest sources of data loss include sloppiness, human error, and just plain forgetfulness.What are some of the unglamorous things that we...
by northlightit | Jan 1, 2019 | Blog
Disaster recovery and business continuity plans are issues that almost all small businesses fail to think about. More frequently, they decide they haven’t the resources to address such “unthinkables.”If your business was down for 1-2 days or more,...
by northlightit | Dec 25, 2018 | Blog
Entrepreneurs and small businesses, especially ones that are fairly new, often don’t think about making plans to recover in case of a disaster. However, it is the smallest business that most likely has the fewest resources to fall back on in case of disaster.Why...
Recent Comments