FOUR WINDS BLOG

The latest in technology resources and news.

10 Reasons to Educate your Front Line in Cyber Security – Part 2

Posted May 14, 2018 by Communications

Four Winds’ last blog left off on the fifth reason for investing in cybersecurity training – ALL companies, both large and small, can be the target of hackers.

5 more reasons why cybersecurity awareness training is an intelligent investment:

  1. With cybersecurity, contracting a virus is the least...

filed under: IT security, Managed Services

Protect your Business and Your Customers by Educating your Front Line

Posted May 9, 2018 by Communications

 

Cybersecurity breaches are expensive and can destroy the trust that customers place in a business and their services. Employees as the end-users of a company’s computers and cell phones, are a business’s first line of defense against security breaches but also their weakest link. What can...

Cybersecurity: A Game Plan for a Successful Business

Posted April 26, 2018 by Communications

 

Companies need to foster a culture where cybersecurity is not just a list of boxes to check off, but, instead, a game plan in which all employees are vital players. With cyberattacks on the rise, CEOs must take a team approach to ‘win the game’ of increased productivity and profit while avoiding...

filed under: IT security

Be one of the 19 Percent of companies prepared for cyber attacks

Posted April 17, 2018 by Communications

 

 

Nineteen percent of senior executives polled by Microsoft and Marsh were highly confident in their company’s ability to prevent a cyberattack, and only thirty percent of those in the survey actually had a plan in place to respond to such an attack. These are not good percentages because any...

Does your C-Suite See Eye to Eye?

Posted April 10, 2018 by Communications

Most CEOs cite malware as the greatest cybersecurity risk while their technical officers see identity breaches as the greater threat. This C-suite disconnect can lead to weak IT decisions that do not reflect or address the true primary threats each individual company is facing. In a survey 0f 800...

filed under: IT security

Security Event vs. Security Incident  

Posted April 5, 2018 by Communications

Security ‘events’ and security ‘incidents’ happen every day in all businesses. What’s the distinction between the two? An ‘event’ is a broad term that describes anything that has significance for system hardware or software, the level of risk associated with the event determines whether or not it...

filed under: IT security

Cybersecurity – CEOs and Boards Must be Proactive

Posted April 3, 2018 by Communications

 

 

Cybersecurity threats are continually advancing and are a serious and costly risk to many businesses. According to former Secretary of the U.S. Department of Homeland Security Michael Chertoff, Many C-suite executives and board directors are not well-versed in security measures and would be...

Does your IT Person Need Back-up too?

Posted November 29, 2017 by Communications

Every company needs strong back-up and disaster recovery plans to protect their data and productivity but what about a ‘back-up’ plan for your IT guy or gal? Do you have an overworked IT person who is working on projects requiring concentration yet constantly being interrupted with pleas for help...

filed under: Managed Services, Network Services, local I.T. Support

it support that listens to you

Posted November 13, 2017 by Communications

 

You deserve an IT service provider who is skilled in these areas:

  1. Does your provider listen and ‘hear between the lines’ and communicate without ‘arrogance and acronyms’? Your IT service engineer should have patience and concentrate on hearing what you, the customer is expressing, whether it’s...

filed under: local I.T. Support

IS YOUR COMPANY ON BOARD WITH CYBER SECURITY AND RISK?

Posted October 20, 2017 by Communications

 

 

Mike Myatt, in his Chief Executive September 21, 2017 article said, “I often tell boards they can either do hard, or hard will do them.” He is referring to the discussion of cyber security and risk in the boardroom. It’s important that boardrooms reserve a seat specifically allocated for this...