NCSAM: Securing Devices at Home and Work—Equipping Your Employees to Securely Work from Home. Did you know that seventy-four percent of companies plan to permanently shift to more remote work post-COVID? (Gartner). However, ninety percent of IT professionals believe remote workers are not secure and seventy percent think remote staff poses a greater risk than...Read More
#FoundersFriday with Erik Tammearu. Connect to Correct… Things, an interesting way to describe what seems to be our new way of life. IoT, internet of things. As we move through our day, you’d be hard-pressed not to leverage the convenience’s these ’things’ bring to our lives. If everything is connected correctly and secured within your...Read More
NCSAM: If You Connect It, Protect It—Smart Devices Need Smart Security. Here are three steps you can take to ensure if you’re connecting it, you’re protecting it. 1. Lock Down Your Login. Make sure that your passwords are long (at least 12 characters), unique and safely stored. Passwords are not enough. Use multi-factor authentication— biometrics,...Read More
NCSAM: If You Connect It, Protect It— IoT Security. What is IoT? IoT (Internet of Things) are devices that have network connectivity, collect user data, process and analyze that data, and then return it back to the user (a giant network of connected devices). Example: your smartphone, smartwatch, smart home appliances, printer, washer & dryer,...Read More
#FoundersFriday with Jeff Starbird. This week I received a letter from Allina Health informing me the company was a victim of a national ransomware attack. Allina was fortunate as their software provider along with forensic experts and law enforcement were able to prevent the cyber criminal from blocking their system access and fully encrypting files....Read More
Similar to the official/unofficial transition from Spring into Summer over the Memorial Day weekend, we are met with the same meteorological season change around the Labor Day weekend. Living in Minnesota, we are blessed with 4 solid seasons! It’s interesting how the anticipation of a change in weather, ecology, and the amount of daylight has...Read More
My gut tells me… When it comes to making decisions, we all look for supporting information, statistics, advice and experience to help us make the correct decision. This applies to our personal and professional lives. I rely on this foundation of ‘my gut tells me’ in most situations, whether it’s related to myself, my family,...Read More
Cyber Security is full of jargon (terms used within a particular industry or group which are difficult for others to understand) and can be intimidating. However, these terms are very important to be aware of and understand. We’re here to help break down the most important terms you need to know. 10 Cyber Security Terms...Read More
A few thoughts from founding partner, Erik Tammearu, in a recent morning meeting: “It occurred to me the other day, the first thing I reach for in the morning is my phone…(not my toothbrush). Then I looked around to see my smart tv, Sonos speaker, Eero, Kindle, Garmin watch…etc. Back to my phone. Staring at...Read More
It’s 8 a.m. I sit down at my desk, open my email, scroll through my inbox and respond to any important action items. It’s part of my morning routine. I bet yours looks similar as well. However, as I go through my inbox on this particular day, I’m reading it differently. I’m actively searching (versus...Read More
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.