Oct 13, 2015 | SMB Technology
According to a recent Trends in Information Security report by CompTIA, malware, hacking, privacy and data loss/leakage top the list of serious concerns over security threats. Companies large and small have been victims of these security threats. While large corporate security breaches makes the news, smaller companies may not have the vigilance to detect, and the resilience to survive a network security breach. Hackers have evolved and are now more sophisticated than ever. Network Monitoring can identify security exploits before it is too late.
Sep 22, 2015 | SMB Technology
Everyday there are reports of businesses being targeted with security attacks. The list of large companies being hit is long. Small businesses are equally vulnerable to security hackers and may be less resilient. To say that security is a top business concern seems unnecessary. Most companies understand that security is not something to be taken lightly. In a recent CompTIA survey, 74 percent of business leaders said that security is a higher priority today than it was two years ago.
Aug 10, 2015 | SMB Technology
Wearable technology, especially Smartwatches, including the Apple Watch, the Samsung Gear, and the Microsoft Band, are all the rage and are expected to become even more popular over the coming years. According to the International Data Corporation (IDC), 2015 will see as many as 72.1 million wearables shipped. They are popular and fashionable, but do they leave your network open to potential security breaches?
Jul 14, 2015 | SMB Technology
Disaster recovery and business continuity planning are processes that help organizations prepare for disruptive events—this might include a hurricane, an earthquake, a power outage caused by a fire or a cyber attack by hackers.
May 22, 2015 | SMB Technology
US ProTech named to the RSA Top-20 List of Security Solutions providers for 2015! Read the article published by CIO Review magazine about US ProTech’s CEO and founder, Jonathan Goetsch. To view the entire magazine, click here and read: New Tools That Demystify IT Security and Measurably Quantify Risk, by Goetsch.