NPI Technology Management Blog

security

Multi-factor authentication (MFA) has come of age at just the right time. Statistics show that password compromises are by far the most likely reason companies experience data breaches. The most recent Verizon Data Breach Investigation Report indicated that 81% of hacking-related breaches leveraged either stolen, default, or weak passwords. The time has come to “up […]

Datto surveyed 1,700+ Managed Service Providers serving 100,000+ small-to-mid-sized businesses around the globe and here are some of the results: Only 38 percent of SMB clients are “highly concerned” about the business threat of ransomware The ransom isn’t what breaks the bank. The downtime and data loss cut the deepest Among those industry verticals who […]

NPI on WCAX-TV

- May 18, 2018

John Burton appeared on WCAX-TV in 2015 and 2016 to discuss computer security. Reporter Keith McGilvray said that John “makes the complex simple” and in these clips he offers password advice, describes ransomware and explains the importance of backups. December 12, 2015 What is Ransomware? June 9, 2016 World Backup Day November 1, 2016 Preventing […]

One of the growing trends in cybercrime prevention is the use of a login technique called multi-factor authentication.  This technology adds a powerful extra layer of security to the access of sensitive information and works for any size business by requiring a further proof of identity beyond a simple password. All multi-factor authentication methods combine a […]

- October 2, 2017

October is National Cyber Security Awareness Month so WCAX-TV invited me to share information on how to stay secure.        

More businesses are moving their storage to the Cloud as the economic and technical benefits grow.  Companies can usually migrate all of their data from local disks to the Cloud in a matter of days or weeks so the good news is that the initial loading process is relatively simple and straightforward. However, Cloud backup […]

The general perception is that only large businesses have vulnerabilities to cyber breaches. In truth, small businesses are just as much of a target as large corporations.  Hackers know that smaller businesses don’t invest as heavily in security or stay informed about the latest exploits. And, best of all, they typically have a treasure trove […]

12/31/17 – The latest date that contractors and subcontractors can continue to maintain and receive new defense related work unless certified for the Defense Federal Acquisition Regulation Supplement (DFARS) clause 252.204-7008 requirements about protecting Controlled Unclassified Information (CUI). 10/1/17 – Contractors and subcontractors receiving awards before this date must report their status within 30 days […]

IT audits are one of many tools to help manage risk and identify areas of your business that are not only open to vulnerabilities but also can be further improved and protected. Consider an IT audit as a litmus test to improve overall accountability.  Auditors provide independent and objective statements of key measurements that illuminate […]

All businesses–regardless of size–have a digital presence. This mandates that both mundane and mission critical data must be regularly backed up and ready for recovery at the drop of a hat. Whether it is managed in-house or outsourced, business owners and financial managers don’t always know what data is backed up, how often it’s backed […]