Posts

No doubt, having an MSP to manage the IT requirements of your dental practice offers multiple benefits. But, be sure to consider the following before you sign up with one.

Read more

Whether you have your in-house IT team, or have outsourced your IT needs to be taken care of by a Managed Services Provider, you need to know what are the possible risks to your business from the IT perspective. Having an IT risk checklist can help you be better prepared for an IT emergency.

Read more

When you look at all the ways that your data can be placed at risk, it can be pretty discouraging. As discussed in our last two blogs, data is at risk from bad actors, failed hardware, human error and external events largely beyond anyone’s control. However, there are a range of solutions, some of which can be money-saving, that can help mitigate risk. Here are four key areas on which to focus.

Read more

Aside from human error and the work of bad actors, our data faces others risks. In particular, the failure of your hardware and software to protect as designed, and the numerous external threats that exist, largely beyond anyone’s control.

Read more

With the news cycle dominated by data that has been stolen by cybercriminals, it is easier to overlook the other, sometimes benign ways your data may be placed at risk and become inaccessible to your employees and customers.

Read more

Disaster recovery is a basic element of good business continuity planning. Business continuity planning refers to the broad range of plans created so that a business–that includes veterinary practices–can continue to be operational no matter what negative event might occur. Business continuity planning addresses severe, catastrophic events, loss of the lead doctor, director, or other principals in the organization, severe natural disasters that incapacitate a physical location, etc. Disaster recovery planning is one piece of this broad planning. Specifically, disaster recovery plans refer to how to quickly recover from some event that compromises your IT infrastructure.

Read more

We hear routinely in the news that a major corporation or government agency has had its data integrity compromised, with millions of pieces of personal data accessed. In these cases the criminals behind the attack hope to get money by selling that data to other criminals. In the case of ransomware, the criminals want your money, and try to get it by holding your data hostage. Plain, old fashioned kidnapping with a hi-tech spin.

What can you do to avoid falling victim?

Read more

There are many threats to the integrity of a small business, and not all of them are as dramatic as a cyberattack or a hurricane. Every small business needs to do a risk assessment to determine all the threats that exist that could bring harm. External threats are the ones that get the the most attention. These can be big snowstorms or hurricanes that bring down power lines and network connections. They can also be man-made. A power outage due to a grid failure, or an act of terror. Also in this category are phishing scams, cyber attacks and data theft from external sources.

Read more

BYOD refers to a firm’s policy of allowing employees to use their own personal phones, tablets and laptops for all their work applications.This is a pretty common policy, and it has many benefits, but it brings along risks. How are you addressing these risks?

Read more

Disaster recovery and business continuity plans are issues that almost all small businesses fail to think about. More frequently, they decide they haven’t the resources to address such “unthinkables.”

If your business was down for 1-2 days or more, what costs would you incur?

Read more