For many of us, our mobile devices hold as much or more, sensitive data than our workstations or desktops. So why should adequate security on our phones be any different?
Here are three facts all business owners and employees must know:
1. U.S. businesses are the top targets of cyber attacks worldwide;
2. The frequency and ferocity of cyber attacks will continue to rise in 2019;
3. Employees are the weakest link in most businesses’ IT security programs.
To help prevent such an attack on your company, EXP is hosted a Security Awareness Training for business owners and employees.
Stratolaunch Systems Corporation is a space transportation venture launched in 2011 by Microsoft co-founder Paul G. Allen. The company’s goal is to make space launch more reliable, affordable, and accessible.
In April 2017, an affiliate company, Allen’s Vulcan Aerospace formally separated from Vulcan, Inc. and was merged into Stratolaunch Systems Corporation. The combined company needed to separate its systems from Vulcan for regulatory compliance reasons. This meant creating an entirely new IT infrastructure robust and secure enough to comply with the strictest security standards enforced for U.S. defense contractors — all in an extremely short time frame.
Stratolaunch chose EXP Technical to tackle this daunting task.
Though writing and enforcing policies and procedures is probably nobody’s favorite area of IT operations, it’s still a vital part of your business. While creating and following set policies is mandatory for government contractors and HIPAA covered entities, EXP takes it a step further. We recommend all companies and organizations maintain and enforce a basic package of policies and procedures that includes the following points…
Since their creation 1994, SSL (Secure Sockets Layer) certificates have been required for websites that share confidential information. They work by encrypting all the traffic between your web browser and a website, making it harder for someone to track what you are looking at from your workstation.
There is a direct connection between your company’s security and productivity. How? The more technology downtime you experience, the less time you have to get your work done, and the less available you are to your clients and customers. But here’s the good news: with […]
In November 2018 our VP of Business Solutions – Pat Cooke presented a webinar on Right-Sized IT Security
& Compliance. This is now recorded and available to view below:
There was a time when strong passwords were good enough to protect your information. More recent wisdom recommends we use passphrases, which are longer and much harder to crack.
Today, as phishing attempts get more sophisticated, you must adapt accordingly because passwords alone don’t cut it […]
“Imagine a typical Seattle weather day (excluding July and August maybe). You’re heading out for a mixed day of fun and errands that may include visiting the local farmers market, taking the dog for a walk, making a trip to a taco truck, and maybe a hike around Discovery Park. You’ll do some walking, some driving and move between indoors and outdoors. How do you dress for this multi-faceted excursion? Layers. The answer is always layers.”
“The typical computer network usually has a closet full of skeletons. Now, there could be more than one closet in any organization, but here I speak of the IT closet, and its name is convenience. It is filled with seemingly harmless security compromises designed to make work more enjoyable, and in the short term, more productive. Filling this closet usually occurs slowly over time, not overnight, and the effects can have serious consequences.”