NPI Technology Management Blog


Multi-factor authentication (MFA) has come of age at just the right time. Statistics show that password compromises are by far the most likely reason companies experience data breaches. The most recent Verizon Data Breach Investigation Report indicated that 81% of hacking-related breaches leveraged either stolen, default, or weak passwords. The time has come to “up […]


- May 18, 2018

John Burton appeared on WCAX-TV in 2015 and 2016 to discuss computer security. Reporter Keith McGilvray said that John “makes the complex simple” and in these clips he offers password advice, describes ransomware and explains the importance of backups. December 12, 2015 What is Ransomware? June 9, 2016 World Backup Day November 1, 2016 Preventing […]

- October 2, 2017

October is National Cyber Security Awareness Month so WCAX-TV invited me to share information on how to stay secure.        

The general perception is that only large businesses have vulnerabilities to cyber breaches. In truth, small businesses are just as much of a target as large corporations.  Hackers know that smaller businesses don’t invest as heavily in security or stay informed about the latest exploits. And, best of all, they typically have a treasure trove […]

All businesses–regardless of size–have a digital presence. This mandates that both mundane and mission critical data must be regularly backed up and ready for recovery at the drop of a hat. Whether it is managed in-house or outsourced, business owners and financial managers don’t always know what data is backed up, how often it’s backed […]

Lamoille Economic Development Corporation (LEDC), Cybersecurity for Small Business  

Whether your company has just one outside road warrior or a fleet of travelling workers, it is imperative to manage their mobile technology wisely.  Not only will they will be more productive but also your company data will remain secure when everything is correctly managed while on the road.  If your field people are not […]

Is BYOD right for your company?

- September 9, 2016

The BYOD (Bring Your Own Device) era has transformed the way that companies communicate with customers, vendors and stakeholders. One way BYOD can positively impact a company’s bottom line is that employees often assume the cost of hardware.  They typically prefer to pick the device they want to use rather than the company standard. Another benefit […]

Today’s C-level executives would be wise to watch a few episodes of the USA network hit series Mr. Robot.  The technology details in the show are provided by a security expert, former hacker Kor Adana.  He recently provided 10 insightful ways to avoid being attacked. Mr. Robot is one of the most accurate cybersecurity shows […]