10-part series CyberSecurity for the Small Business – Introduction

Cybersecurity experts often refer to the 10/90 rule. The rule suggests that 10% of cybersecurity is reliant upon technology such as firewalls, anti-virus software and related tools. 90% of cybersecurity is up to the users. This past September (2017), the IRS released they were receiving reports of data breaches with tax professionals at the rate [...]

By | 2017-11-10T17:36:57+00:00 November 10th, 2017|Business, Policies, Procedures, Security|0 Comments

What is PACE?

 PACE is a planning tool I learned in the ARMY. PACE is an acronym for Primary, Alternate, Contingent and Emergency. Specifically, at the time, it was used to describe the communications plans for a unit in different situations. Over time, I have learned to apply PACE to many other aspects of life and business. Here [...]

By | 2017-11-07T13:54:26+00:00 November 7th, 2017|Business Continuity, Policies, Procedures, Readiness|0 Comments

Another Ransomware Attack Raging Across Europe

And ... Here we go, again. Another Ransomware attack is raging across Europe, right now, and has hit at least one US business.  Here is the basics of what you need to know:  The Petya virus is successfully detected by only a few of the tested anti-virus softwares. Webroot (which I offer to my clients) [...]

By | 2017-06-27T11:49:02+00:00 June 27th, 2017|Backups, Business, Monitoring, Policies, Procedures, Security, Services|0 Comments

Installing Indy’s I.T. Department’s Support Agent

Download and install the Support Agent for Indy's I.T. Department's free monitoring of your computer system. First, visit http://Indysitdepartment.com/downloads. Select, download and run the AgentSetup.exe program. Follow the images, below to install the support agent. ** If you receive this 'Fix Identity' notice, please stop and contact Indy's I.T. Department at 317-560-4443 or via e-mail [...]

By | 2017-06-07T10:40:03+00:00 June 7th, 2017|Business, Documentation, Monitoring, Policies, Services|0 Comments

To Cookie or Not To Cookie

There are a lot websites that we visit daily who put 'cookies' on our computers and into our browsers. In reality, cookies are a small slice of data stored in a file on your computer. The cookie is used as a part of tracking software that can collect valuable information about you. These valuable pieces [...]

By | 2017-06-05T13:06:11+00:00 June 5th, 2017|Business, Policies, Security, Services|0 Comments

How-To Protect Against Ransomware

Today in a networking meeting, I was asked "What is the best way to protect against these ransomware threats?" As an I.T. guy, my immediate answer was … well, sarcastic. Something about air-gapped systems with no internet access and so on. In reality, not a practical, though accurate answer. Fortunately, Stephanie understood I was giving [...]

Why WannaCry was so easily spread

This past weekend, May 13th of 2017, the WannaCry ransomware virus spread like wildfire, around the planet. Worming it's way form machine to machine, the WannaCry virus used a network vulnerability in the Windows Operating System. A vulnerability that Microsoft had already released a patch for, the previous February. WannaCry infected thousands of computers, including [...]

By | 2017-05-15T10:37:33+00:00 May 15th, 2017|Backups, Business, Business Continuity, Policies, Security, Services|0 Comments

How to Backup Single User Data on a Windows 8 Systems

A Facebook conversation today lead a contact to ask how to perform a Windows 8 backup. This lead to a few questions and answers and a promise to create this blob post. So, let's just jump into it. Before getting started, we need to recognize that Microsoft removed the NT Backup utility from Windows 8. [...]

By | 2017-02-02T18:49:14+00:00 February 2nd, 2017|Backups, Business, Business Continuity, Documentation, Policies, Procedures|0 Comments