Four Winds Forecast

Hot Topics, Trends, and Everything Else IT

7 Steps to Protect your Business During Hurricane Season

[fa icon="calendar'] August 24, 2020 / by Communications posted in Disaster Preparedness, Cyber Security

Unfortunately for Florida, Mother Nature did not get the memo telling her to take it easy after the COVID outbreak and has instead decided to throw an "above average hurricane season" our way. This could have a major impact on businesses still in recovery mode as enduring a major storm right after the outbreak could prove impossible. 

Read More [fa icon="long-arrow-right"]

Hurricane Season: Mother Nature’s Friendly not so Reminder to Leverage Your IT

[fa icon="calendar'] August 5, 2019 / by Communications posted in Disaster Preparedness, Cyber Security

Alright, let’s cut to the chase, we all know what a hurricane is and its potential for destruction. Around this time of year statistics are thrown out from news outlets and social media about damage from previous years and what’s on the horizon in the coming months. Even the Department of Homeland Security sponsors a site for disaster planning to urge businesses to be prepared ahead of time. At this point, if you do not consider storms a threat throwing more statistics (like the one to your right) at you isn’t going to change your mind.

Read More [fa icon="long-arrow-right"]

The Phishing Tackle Box: Your Guide to Avoid Getting Hooked

[fa icon="calendar'] June 27, 2019 / by Communications posted in Cyber Security

You ever been phishing? No, I am not talking about the relaxing, semi-boring, past-time spent with Grandpa on the lake, but those off-putting, suspicious emails and other messages you get that just don’t seem quite right.

Read More [fa icon="long-arrow-right"]

Data Privacy and Security Reform: We’re Next

[fa icon="calendar'] May 31, 2019 / by Communications posted in Cyber Security, Compliance

Compliance is Coming for US... Businesses

Since the advent of the internet, the storage and use of private data has been as cavalier as the Wild West. Businesses have been free to collect any data they can get their hands on, build massive customer databases, and then manipulate or even sell the information for their benefit.

Read More [fa icon="long-arrow-right"]

Malware, Hacking, and Phishing, Oh My!

[fa icon="calendar'] April 17, 2019 / by Communications posted in IT Roadmap, Cyber Security

As the country combats the Conora virus outbreak more companies are sending their employees home to work remotely to keep them safe and healthy. Although this is a fantastic way to maintain operations, working from a home network doesn't offer the same security as an office armed with corporate grade security. Hackers will kick you while you're down, so make sure you and your team can spot anything phishy and keep your business protected.

Read More [fa icon="long-arrow-right"]

Marriott Database Debacle: A Cautionary Tale

[fa icon="calendar'] April 1, 2019 / by Communications posted in IT Roadmap, Cyber Security

Historic Breach

Remember the story of the Trojan Horse? The Trojans and Greeks had reached a standstill in their war because the walls around the city of Troy could not be breached. One day, the Trojans woke up to find that the Greeks had fled in the middle of the night, leaving behind a wooden horse as a gift. Happy to finally be finished with the war, the Trojans eagerly carried the horse inside their city walls. That very night Greek soldiers sprung from the horse and destroyed the city from the inside and the rest is, as they say, history.

Read More [fa icon="long-arrow-right"]