What is Two-Factor Authentication (2FA)?

Patrick Leonard

Two-Factor Authentication is an extra layer of security that requires more than just the user’s name and password. To gain access, the user must present something via a different method such as a token, fingerprint, web cookie, or code from a text message or authentication application like Google Authenticator. Two-Factor Authentication is known as 2FA for short, or even Two-Step Verification (TFA). For comparison, Single-Factor Authentication (SFA) only requires your username and password, and it is still the most common form of access because of its low cost and ease of use, but a hacker can breach most password-based security systems easily.

Read More
Topics: Data Protection

3 Biggest Construction Cybersecurity Risks

Michael Erdman

The construction industry is driving technology and innovation on the jobsite to become more efficient, profitable, and to combat the ongoing worker shortage. Today, construction equipment is equipped with on-board computers, sensors, GPS, and more. Crews must work with dozens of companies from the design phase with architects, engineers, and sub-consultants, to the build phase which includes numerous subcontractors, requiring them to share sensitive data in real-time. Yet, with all this technology and data, there is no universal industry best practice for cybersecurity in construction, like how healthcare has HIPAA compliancy. So how do you minimize the cybersecurity risks at your construction company without effecting productivity?

Read More
Topics: Architecture/Engineering/Construction

3 Biggest Cybersecurity Mistakes Medical Practices Make

Stephen Tullos

Healthcare is no longer just about curing ailing patients. Medicine requires securing your patient’s Protected Health Information (PHI).

Even though HIPAA has been around since 1996, last year the industry averaged a breach a day, affecting 27,314,647 patient records. (Protenus) Even with millions of dollars paid in fines (in February, a Miami, Florida non-profit paid $5.5 million to settle a HIPAA case and a Dallas-area hospital paid a $3.2 million HIPAA penalty according to MSPmentor report), most medical practices don’t know what to do when it comes to securing their PHI and we regularly see these 3 cybersecurity mistakes at medical practices.  

Read More
Topics: Heathcare IT

Top 3 Auto Dealership Cybersecurity Mistakes

Patrick Leonard

Although most auto dealerships have robust security systems and processes in place to protect their inventory of cars and parts (and money), many auto dealerships are inept in their cybersecurity. Generally, the absence of cybersecurity is from a lack of knowledge of the threat and ramifications of a cyber-attack. Many General Managers feel their dealerships are too small to be targeted by a hacker or they think if they ignore it long enough, the problem will never arise.

Read More
Topics: Automotive

6 Critical Steps SMBs Need to Protect Themselves from Ransomware

Stephen Tullos

Cybersecurity is all over the news thanks to WannaCry’s high-profile attack on NHS (National Health Service) and more than 200,000 systems in over 150 countries. Yet, many companies were unaffected because they fortified themselves against such cyber-attacks. How does a small to mid-sized company prevent a cyber-attack such as one with the reach of WannaCry?

Read More
Topics: Data Protection

Cybersecurity Myths Executives Cling To

Dave Bourgeois & Patrick Leonard

One of the biggest obstacles in cybersecurity is company executives who think they do not need to worry about cyber-attacks. The range of excuses why cybersecurity isn’t on executives’ radars are wide and we’ll debunk them in a bit.

Keep in mind, if you don’t do anything to prevent or mitigate a cyber-attack, it will probably be too late to do anything once it starts. Whether you’re a Fortune 500 enterprise or a small three-person company, 94% of all companies do not survive more than two years following a major data loss regardless if it is a cyber-attack, theft, or disaster. [Gartner]

Prevention is the best way to protect your company’s future and it is a lot cheaper too.

Read More
Topics: Data Protection

Construction Tech – Smart Tools

Perryn Olson

Last month we discussed how tech savvy construction jobsites have become over the past few years. Besides having a robust remote office in a temporary jobsite trailer that houses high speed internet, smartboards, and digital blueprints, the tools on the jobsite have become “smart” too. By smart, I mean connected to the network and offer the user detailed information about the job at hand. Yes, we’re way past tools just having digital displays and laser beams. Now those laser beams can automatically measure distances for pinpoint accuracy and in less time than doing the task manually. The era of construction smart tools has already begun.

Read More
Topics: Architecture/Engineering/Construction

9 Reasons Why Small Medical Practices are Most Vulnerable to a Cyber-Attack

Stephen Tullos

As my team and I talk to different medical practices, we are amazed how many of them are oblivious to HIPAA regulations and just how vulnerable they are to a cyber-attack. Like HIPAA, hackers don’t take ignorance as an excuse.

9 Reasons Why Small Medical Practices are Most Vulnerable to a Cyber-Attack

  1. Lack Concern of Cyber-Attack Threat – Most small businesses, including medical practices, think they’re too small to be a target to hackers. Unfortunately, medical data is a prize most hackers want to get their hands on and they will specifically target small medical practices expecting to find little to no cybersecurity in place. Also, hackers can use bots that crawl the internet looking for “open windows” into networks; if they stumble on a medical practice, they could be in for a big payday.
Read More
Topics: Heathcare IT

Fear of Losing Control When Outsourcing IT (Part 4 of our Hiring IT Series)

David Bourgeois

Last week I spoke to two CFOs that had the same concerns, but from very different aspects. Both CFOs work at high growth companies that have gone from 10 to 50 employees in the last few years and each company plans to grow well above 100 employees. Not surprisingly, around the 50-person mark, each of them was looking at their next steps regarding IT. Because of my series on Hiring IT, these CFOs reached out and asked me to look at their specific IT situations, then give my thoughts on what they should do next. I started out by asking each CFO what concerns with IT they had.

One of the CFOs was considering hiring the company’s first internal IT professional because they were outgrowing their single IT guy’s capabilities and he was stretched too thin because he had a dozen other clients. The other CFO was looking to outsource the IT for the first time, taking that burden off one of the company's senior executives that adequately handled it when they were smaller, but now is in over his head. To my surprise, each had the same concern – a fear of losing control and confidentiality. Even though they were looking at two different avenues of solving their technology needs (hiring versus outsourcing), each had the exact same concerns. I thought I’d continue my Hiring IT series to address their concerns, especially since this isn’t the first time I’ve heard them.

Read More
Topics: High Growth

What is an Auto Technology Specialist Anyway?

Patrick Leonard

After writing my blog post, Where Auto Dealerships Use Technology to Drive Profitability, I received emails regarding one line in the introductory paragraph all asking, “What is an Auto Technology Specialist? Tell me more about that.”

The line that I wrote in my initial post:

Cars have so much technology packed in them that many auto dealerships now have an auto technologist on staff just to demo all the gadgets on board to the new owners.

In short, an Auto Technology Specialist isn’t on the IT or network side of technology like myself. The person in this position demonstrates all the technology in the vehicle to the new owners.

Read More
Topics: Automotive

About My IT's Blog

We believe an educated client is the best client, therefore, we share our knowledge with executives and business owners looking for a fair, knowledgeable IT firm that fits well with their company and objectives.

My IT helps companies to protect their data, become more efficient and productive, and to boost high-growth using technology. In our blog, we discuss these topics and our extensive expertise working with medical practices, construction industry companies, and auto dealerships.

New Call-to-action

Share This Page

    

Subscribe to Email Updates

Real Time Web Analytics