504-588-2000
4423 LaSalle St.
Contact Us

Infographic: 8 Cybersecurity Work From Home Tips

Work from home is the new normal. For many, it is likely to continue to some degree long after the COVID-19 crisis.  Here are 8 cybersecurity work from home tips to protect yourself digitally. Feel free to download and distribute this infographic. Click to Download

Read More

Cybersecurity

Like much of IT, cybersecurity is not a one-size-fits-all proposition. The comprehensive approach that large enterprises should employ to identify and address risks and detect and respond to attacks is often out of reach for small businesses. Yet as the frequency and impact of cyberattacks on businesses of all sizes continues to grow, the typical small-business approach of taking the usual precautions and hoping for the best is proving to be inadequate. Many small-business owners are willing to do more to improve their cybersecurity but don’t know what else to do.  The number of options — whether products or services […]

Read More

Disaster Recovery Plan

Now’s the time to review your DR plan. Much has changed with disaster recovery in the 10-plus years since we got a firsthand lesson from Hurricane Katrina. Server virtualization now makes recovery of many systems much easier and faster than it was, and the rise of the cloud puts more options at our disposal than we could have previously imagined. Hurricane season is officially here, making it a good time to review the current state of disaster recovery solutions. What is Disaster Recovery? First, a bit of terminology; This article is about disaster recovery, which for our purposes deals with […]

Read More

Think Before You Click

Cybersecurity awareness is key for business. From a cybersecurity standpoint, the one behavior that leads to more headaches than any other for small or midsize businesses is people clicking (or otherwise acting) on things in emails that they shouldn’t. The IT team can help: Certainly scanning email for malware or signs of phishing is a must. Other techniques that detect and take action on the presence of malware on a computer or network have also proved effective, but there is only so much that anyone can do technically to mitigate the potential impact of email attacks. Cybersecurity Threats are more […]

Read More
Subscribe to our Blog Sign up now!