Blog

How to stay safe and secure online in 2018

How to stay safe and secure online in 2018

One of the few industries in the world that will never see budget cuts is security. As the world grows ever more complex and connected, our valuable information is increasingly exposed to malicious actors around the world.

However, there are experts around the world working behind the scenes to fight the good fight, thwarting the hackers with ingenious new technologies such as the self-healing BIOS, self-encrypting drives and pre-boot authentication.

5-step security compliance for SMBs

5-step security compliance for SMBs

What is security compliance?

Being security compliant means your IT protocols follow prevailing local and international industry standards, as well as adhere to any laws that apply in your locality.

Examples include adhering to local privacy and security of personal information laws if, for example, you record your customers’ personal and/or financial details.

Security Update: Meltdown & Spectre Vulnerabilities

Security Update: Meltdown & Spectre Vulnerabilities

As reported by several news outlets, Meltdown and Spectre are the names of two CPU vulnerabilities that impact most currently-used computer processors. It’s important to note that these are vulnerabilities and not the names of specific viruses or infections and that the major risk associated with these issues is information theft.

Spectre and Meltdown: How to protect your business and the costs of an office-wide fix

Spectre and Meltdown: How to protect your business and the costs of an office-wide fix

It’s been almost a month since Spectre and Meltdown -- two of the biggest IT security vulnerabilities in history -- were announced. Hundreds of newspapers, TV anchors and blogs have tried to explain what they are and how they work, but the average Rochester or Buffalo business owner has little interest in the specifics, and we have no intention of adding more confusion to the mix.

Last-minute Valentine’s ideas for Flower City residents who forgot to make reservations

Last-minute Valentine’s ideas for Flower City residents who forgot to make reservations

Love and roses, wine and chocolate, Valentine’s day is about celebrating perfect pairings. But every year many of us struggle to plan ahead for a way to show our other half how much we care. Sometimes it’s sheer forgetfulness and sometimes it’s a consequence of burning the candle at both ends.

The cost of outsourcing NYDFS cybersecurity compliance is 1% of what penalty costs

The cost of outsourcing NYDFS cybersecurity compliance is 1% of what penalty costs

New York’s cybersecurity regulations for financial services institutions (and their contractors!) have been law for just shy of a year, and that means there’s a swath of deadlines approaching.

There are hundreds of affected companies in Rochester and Buffalo, and most of them don’t have enough in-house resources or IT experience to comply with the burdensome regulations.

Capstone Newsletter – Winter 2018

Capstone Newsletter – Winter 2018

The Capstone newsletter provides articles and tips to help your organization run faster, easier, and more profitable. In this issue, find out how to get a FREE credential scan, 2018 business inspirational letter from Sitima, cyber security tips to safe, upcoming educational events, and much more.

Security Update: Meltdown & Spectre Vulnerabilities

Security Update: Meltdown & Spectre Vulnerabilities

As reported by several news outlets, Meltdown and Spectre are the names of two CPU vulnerabilities that impact most currently-used computer processors. It’s important to note that these are vulnerabilities and not the names of specific viruses or infections and that the major risk associated with these issues is information theft.

5 New Year’s Resolutions to Turn 2018 into Your Best Year Yet

5 New Year’s Resolutions to Turn 2018 into Your Best Year Yet

While many people don’t have much faith in New Year’s resolutions, that doesn’t mean you can afford to ignore the importance of planning for the year ahead with growth, success and sustainability in mind. After all, goals and resolutions are the same thing.

How to Protect Your Business from the KRACK WiFi Vulnerability

How to Protect Your Business from the KRACK WiFi Vulnerability

Most people assume that a passkey-protected wireless network is completely secure and inaccessible to anyone who doesn’t know the key. Under normal circumstances, they would be correct; but back in October, a serious vulnerability was detected in the WPA2 security protocol.