Cybersecurity Beyond the Basics: The Principle of Least Privilege

With a Zero Trust strategy for cybersecurity, the presence of an intruder is assumed. That means that tactics are needed to limit exposure and the potential damage that the intruder can do. One of those tactics is the Principle of Least Privilege.

Least privilege involves matching up permissions to access data with the job or tasks that need to be done.

The Pros and Cons of Internal IT vs Managed IT Services

There comes a time when business leaders are forced to rethink the IT function of their business and ask themselves – Should we continue to have internal IT staff or is it time to outsource managed IT services? It could be that the IT manager is leaving or there’s been a lot of turn-over in IT. Maybe the organization had a cyber-attack.

Cybersecurity Beyond the Basics: What is Zero Trust?

Imagine that you’re in charge of protecting a castle. The castle has a drawbridge and a moat around it. You have guards stationed at the drawbridge who monitor the people coming into the castle. The guards let citizens in and keep known bad guys out. Because the guards prevent the bad guys from coming into the castle, the citizens can safely go about their business.

IT Not Serving Your Business? It’s Time for Managed IT Services

The term “Managed IT Services” isn’t new but unfortunately, there are a lot of companies that say they’re “managed” but they’re really not. How can you tell the difference and how do you know if that’s what your organization needs? Start by asking yourself, “Is IT serving our business?”

Here’s what we mean by serving your business.

Is this Website Address Safe to Visit or Login To?

Here are some ways you can decide whether to trust a website link or page in a web browser and tell when things smell phishy. Taking the time to look for signs of a hack attempt in links and websites is like washing your hands; it helps keep you and your co-workers safe, and every adult should know how to do it.

Out to Lunch Podcast: Life Online

Bellwether Technology President Steven Ellis joins It's New Orleans and the Out to Lunch Podcast to discuss online threats and cybersecurity. Give it a listen for some up to date information on how hackers and scammers are targeting businesses.

Life Online


Employee Spotlight Series: Parker Bordeaux

Parker Bordeaux: a geographic information systems expert with a penchant for the visual arts
Parker Bordeaux, a New Orleans native, joined Bellwether off the heels of completing his undergraduate degree in December 2014. At Vanderbilt, as a math major, Parker found a true passion in problem-solving, something he wished to carry into his career.

My IT Company is Understaffed (Part 2)

Too often an IT company will take on more clients than they can reasonably handle.  They price managed services too low to be able to staff appropriately and find themselves unable to deliver on promises made to their clients and to their employees.

In part 1 we examined what is going on behind the scenes of an understaffed managed IT company.

My IT Company is Understaffed (Part 1)

Any IT frustration that you are feeling can always be traced back to this, your IT company is understaffed
Does any of this sound familiar?

I’m tired of seeing the same issues.
We have new employees starting, but their computers aren’t ready.

Infographic: 8 Cybersecurity Work From Home Tips

Work from home is the new normal.
For many, it is likely to continue to some degree long after the COVID-19 crisis.  Here are 8 cybersecurity work from home tips to protect yourself digitally.

Feel free to download and distribute this infographic.
Click to Download

5 Things Your IT Department Should Be Doing Right Now

COVID-19 has presented your IT department with a great opportunity
After spending the last few weeks managing work-from-home requests, it is time for IT departments to take advantage of empty offices and quiet networks. Often times, important items are overlooked or put off, because of concerns over user impact.