Ransomware: Don’t Let Your Company Be Held Hostage

2019-06-10T18:22:24+00:00May 14th, 2019|Security|

The productivity of your employees is paramount. Unfortunately, with a single mouse click, one employee could bring your entire company to a screeching halt. Even worse, your company could be held hostage to pay a substantial amount of money to return to business-as-usual. That's the definition of ransomware - a growing epidemic amongst small, medium, [...]

Prepping for a Successful Office Move

2019-04-09T20:36:38+00:00April 8th, 2019|Business Continuity|

As businesses grow and change, they are likely to experience frequent office moves. The success of all office moves is directly impacted by the effective management of the office information technology – an area where most small business owners and managers often don’t have a lot of confidence. From our experience in managing the technology [...]

Cybersecurity Tips for 2019: How to Spot a Phishing Email

2019-04-09T19:19:13+00:00April 2nd, 2019|Security|

Phishing is not a fun day on the water! Phishing emails lure you (the victim) into clicking on a malicious URL or email attachment so that you hand over your personal data. What is Phishing? Phishing is very similar to spending a day on an ocean or lake but instead of trying to reel in [...]

Cybersecurity Tips for Spring Break – Protect Yourself

2019-03-12T16:35:09+00:00March 12th, 2019|Mobility, Security|

Planning a trip? Getting ready to travel with your laptop for business or pleasure? As important as it is to deploy safe cyber practices while at home, it is even more important to be aware of cybersecurity risks while traveling. According to a TripWire survey, 51% of Americans believe that using personal devices on vacation [...]

Cybersecurity Tips for 2019: Security on the Move

2019-03-12T14:47:47+00:00March 5th, 2019|Mobile Device Management, Mobility|

Does your company have a mobile device management policy? According to Information Week, only 33% of companies in the US have a deployed solution. How should you begin to protect your data? In today’s business environment “bring your own device” (BYOD) is now common practice. The way people work has changed with cloud and mobility [...]

Data Loss and Your Disaster Recovery Plan

2019-03-12T17:32:05+00:00February 11th, 2019|Disaster Recovery|

Every business, regardless of their size, should have a data backup and disaster recovery plan in place. While it may seem unlikely, mistakes do occur, and when they jeopardize your business-critical information, you'll want to have a plan that can restore your data with little to no downtime. At ACS, 80 percent of breaches that [...]

Data Backup and Disaster Recovery

2019-03-12T17:15:47+00:00February 5th, 2019|Disaster Recovery|

A Data Backup and Disaster Recovery plan will protect a business's data in situations ranging from an employee deleting a spreadsheet to a hardware failure like a server crash, to a fire or flood that destroys the office. In every situation a plan is imperative. Without a solid disaster recovery plan in place, companies can [...]

Corporate Security + Corporate Planning = Corporate Growth

2019-03-12T17:15:00+00:00January 22nd, 2019|Strategic Planning|

In today’s global economy, one major business challenge is how efficiently it can expand, or in other words, how effectively a company can reach out to potential new clients all over the world. Technology may be the driving force supporting this growth opportunity but a corporate IT security strategy should also be in place and [...]

IT Security Audit

2019-03-12T17:31:12+00:00January 8th, 2019|Security|

 Has your company had thorough penetration testing or an IT security audit performed? Your firewall, anti-virus, and even the best practices you have in place will not give you the detailed information that a proper security audit can. Without it, you will not understand what your vulnerabilities are or where some potential holes are. [...]

Mobile Device Management Plans

2019-03-12T17:13:47+00:00January 16th, 2018|Mobile Device Management, Mobility|

Do you know anyone who has had their cell phone stolen? At ACS we consider it critical that you have a mobile device management plan as part of your security plan. Consider this, most people's cell phones contain business-critical information including phone numbers, emails, or proposals as well as other sensitive business information. You wouldn't [...]