FBI Cybersecurity Resources and Covid-19 Recommendations

Last week we were honored to team up with the FBI (in partnership with the Cyber Center of Excellence (CCOE)) and Biocom on behalf of our biotech heros. The team hosted an exclusive executive-level briefing on cybersecurity specifically tailored to San Diego’s life sciences industry. This Biocom-member webinar contained an overview of the security challenges companies are facing in 2020 and beyond. In addition to industry-specific advice and an overview of current insider threats, the FBI left us with the following FBI cybersecurity resources and covid-19 recommendations. Read more “FBI Cybersecurity Resources and Covid-19 Recommendations”

Planning Your Business Continuity IT Strategy

Have you spent time revising or planning your business continuity IT strategy yet?

Business Continuity Planning is something you ideally do before a crisis occurs. Let’s set the scene for this post: it’s June 2020, the middle of nationwide protests and an international pandemic due to covid-19. We want to make sure businesses have the info they need to prepare and rebuild as quickly as possible from the upheaval they are experiencing. What better time to give tips to local companies? We set up a complimentary Business Continuity Planning webinar with PBO Advisory Group, tW2 Marketing, and Rad-on-Point Consulting

The day we gave the webinar, yet another threat appeared as wildfires broke out in San Diego county. The moral of the story? Business continuity plans are not just important, they are critical, and they should be robust enough to cover a range of potential crises.

Here is how to plan your business continuity IT strategy.

Read more “Planning Your Business Continuity IT Strategy”

Why You Should Integrate Your IT Services and IT Security

Why You Should Integrate Your IT Services and IT Security

IT services and IT security are not mutually exclusive. So why do managed service providers (MSPs) treat them differently? Why do they often set up separate entities to provide these services?

What many IT service providers don’t understand is that these two concepts work in tandem: IT services influence IT security, and vice versa. We think it’s time to integrate them once and for all.

Here’s why you should incorporate IT security into your managed IT services.

(more…)

The Complete Guide To Securing Your Company’s Network

The threats of cybersecurity attacks and hacking aren’t limited to large enterprises. The importance of securing your company’s network could not be understated.
 
Small and medium-sized businesses frequently face these threats, too. According to a UPS Capital report, small and medium-sized businesses represent almost two-thirds of companies that experience a cybersecurity breach in the United States.
 
Moreover, data breaches continue to climb and went from just 200 data breaches in 2005 to 1,300 in 2017. With data breaches forecasted to rise, it’s important to be aware of some of the top types of security breaches your company is up against and how to secure your company’s network. Here’s how you can get it done.

(more…)

How Cybersecurity Worked Before 1970

Today, cybersecurity is a hot topic. You can’t turn on the news without hearing about hacking, protecting against hacking or other cybersecurity-related topics. In fact, the term “Cyber”, no longer meaning “Cybernetic”, has become IT slang for “Cybersecurity”. Cybersecurity is portrayed today as a war between the good guys and bad guys. This war is nothing new, in fact cybersecurity began when humans made the first technological advance.

(more…)