Blog about Data Protection

Thoughts & ideas about data protection for SMBs from My IT

  • Beware of Fear-based COVID-19 Phishing Attacks
    March 25, 2020 at 4:30 PM

    Globally, people are looking for honest information, facts, and answers to the COVID-19 (Corona Virus) Pandemic. Many organizations, including the Center for Disease Control (CDC), are doing their best to educate the public and prevent mass hyst...

  • Non-Technical Person’s View to Protect Against Phishing Emails
    March 18, 2020 at 9:00 PM

    Before joining My IT a year ago, I worked in the art museum world for 17 years with a rather blasé attitude towards cybersecurity. Of course, the Museum had a Network Security Administrator in the IT Department, but no one outside of that depar...

  • Two Huge, Scary, Unique Data Breaches that Will Effect You Personally
    January 17, 2020 at 2:00 PM

    What Happened

    Back in November, two of the largest data breaches ever occurred, but despite being headline news, many people outside the security industry failed to notice beca...

  • Cybersecurity Best Practices -- Protect Your Passwords 
    October 31, 2019 at 5:00 AM

    Keep your passwords completely unique for each login, including your personal accounts.  

    Using the same password, or a similar password, across multiple systems i...

  • What is the Dark Web? What Do I Do If My Info is on the Dark Web? 
    October 31, 2019 at 8:00 AM

    The Dark Web is not dissimilar to the regular internet that you are accustomed to using daily. The major difference is that it is only accessible by using a specific web browser called, Tor browser.  

    Without going into a bunch of technica...

  • 4 Ways Technology Saves Time in Construction Sites
    July 9, 2019 at 12:00 AM

    When you want to talk construction tech, you should include people from the teams writing the code. With that in mind, we asked Patrick Hogan the CEO of Handle for his thoughts on how construction technology saves time on the jobsite. Here are his thoug...

  • Drones in Construction - Different Types & Uses
    June 7, 2019 at 12:00 AM

    When we talk tech to our construction clients and friends in the build industry, many people are surprised to hear about the vast uses of drones in construction and how many different types of drones exist.

    Our friends at Trik sent us anoth...

  • Old Passwords Are A Massive Cybersecurity Risk; Here is Why.
    May 22, 2019 at 8:00 AM

    Here at My IT, we use tools to actively monitor the dark web for data breaches concerning our clients. We then present that information to our clients so they can act on it in a timely manner. This is all well and good, but often I hear the argument tha...

  • Scariest Email I Ever Received!
    April 16, 2019 at 8:00 AM

    talking to a friend this morning who is a business adviser, we discussed common questions and assumptions his clients have regarding cybersecurity. One of their assumptions was dead wrong and it reminded me of the scariest email I ever received.

  • The ROI of SSD vs HDD Hard Drives
    April 11, 2019 at 1:00 PM

    Solid state drives (SSD) and hard disk drives (HDD) are storage types that come in different shapes and sizes to fit all machines, but when it comes to selecting the right storage type for your workstations, businesses need to understand the distinction...

  • Bitcoin for Business
    December 5, 2018 at 8:00 AM

    Being in the technology industry, we’re regularly asked all things tech and we’ve had a lot of questions concerning Bitcoin lately. We reached out to our local Bitcoin advocate Raina Casbon-Kelts to learn more about what Bitcoin is and why businesses wo...

  • How Natural Disasters Impact Businesses
    June 1, 2018 at 8:00 AM

    Business owners can spend many sleepless nights worrying about the myriad disasters that can strike their companies. Will there be a labor dispute? Will the server go down tomorrow? Is an employee going to say something stupid on social media? In any ca...

  • Password Best Practices
    May 3, 2018 at 8:00 AM

    The first Thursday of May each year is World Password Day, a celebration to promote better password habits. "Passwords are critical gatekeepers to our digital identities, allowing us to access online shopping, dating, banking, social media, private...

  • Our Favorite Business Apps
    March 13, 2018 at 8:00 AM

    Here at My IT, we’re all about leveraging technology to improve efficiencies to help our clients grow and be more profitable. Over the past five years, we’ve over doubled our company’s client base while only adding a few new team members because of our ...

  • 2018 Cybersecurity Trends to Watch
    December 26, 2017 at 8:00 AM

    ith the new year looming, all of the Top 10 lists for 2017 are coming out, so we asked our team what does 2018 have in store in regards to cybersecurity. The new year looks grim.

    2017 showed the world that hackers have gotten better. Last y...

  • How Consumers Can Protect Themselves Online on Cyber Monday
    November 7, 2017 at 8:00 AM

    Cybersecurity is top of mind for many business leaders thanks in part to Ransomwares like WannaCry and HIPAA data breaches being in the headlines nearly every month this year. With that in mind and Cyber Monday around the corner, we put together this li...

  • Productivity Improvements with iOS11
    October 10, 2017 at 8:00 AM

    Apple’s new operating system, iOS11, is chock full of fun new features like gifs integrated in the Photo app and VR flyover cities. Instead of listing the 100+ changes, let’s focus on the twelves updates that can improve productivity for your business.<...

  • Ask a Cyber-Risk Insurance Agent
    September 5, 2017 at 8:00 AM

    After our post, Do I Need Cyber Insurance [For My Business], we received notes from clients and friends thanking us for bringing this to their attention. We also got a lot of questions. We asked insurance agents in the New Orleans area that we knew spec...

  • Cybercrime Myths Costing You Money
    July 4, 2017 at 8:00 AM

    Criminals make millions of dollars off naïve, unwittingly victims every year because of common myths regarding cybersecurity. The scariest part of cybercrime is that it is mostly preventable and affordable, but SMB owners and executives need to stop pre...

  • What is Advanced Threat Protection (ATP) for Email?
    June 20, 2017 at 8:00 AM

    Advanced Threat Protection (ATP) can mean a lot of things, but when describing an email feature, it is a tool created to stop email threats from hitting your inbox. Since the majority of ransomware and other viruses enter a company’s network via malicio...

  • What Does IoT Mean for Your Office? The Office of the Near Future.
    June 6, 2017 at 8:00 AM

    You’ve probably heard of the Internet of Things, IoT for short, but you may not have known it was called IoT and you may think it is decades away from ever happening. A “connected office” it isn’t that far-fetched either, nor is it years away. Per Gartn...

  • What is Two-Factor Authentication (2FA)?
    May 23, 2017 at 8:00 AM

    Two-Factor Authentication is an extra layer of security that requires more than just the user’s name and password. To gain access, the user must present something via a different method such as a token, fingerprint, web cookie, or code from a text messa...

  • 6 Critical Steps SMBs Need to Protect Themselves from Ransomware
    May 2, 2017 at 8:00 AM

    Cybersecurity is all over the news thanks to WannaCry’s high-profile attack on NHS (National Health Service) and more than 200,000 systems in over 150 countries. Yet, many companies were unaffected because they fortified themselves against such cyber-at...

  • Cybersecurity Myths Executives Cling To
    May 2, 2017 at 1:00 PM

    One of the biggest obstacles in cybersecurity is company executives who think they do not need to worry about cyber-attacks. The range of excuses why cybersecurity isn’t on executives’ radars are wide and we’ll debunk them in a bit.

    Keep in...

  • Do I Need Cyber Insurance?
    April 4, 2017 at 1:00 PM

    It may surprise you that your general commercial property and casualty insurance doesn’t cover cyber-attacks. You may not know such a thing as “cyber insurance” even exists or why a business would need cyber insurance.

    Cyber insurance finan...

  • Why Shred Hard Drives?
    March 7, 2017 at 2:00 PM

    Our policy at My IT for dealing with Hard Drives is to either shred them, or to hand them back to our clients for them to decide how to personally dispose of them or to securely store them indefinitely.

    Read More

  • What Should I Do with My Old Computer Equipment?
    February 28, 2017 at 2:00 PM

    Computers, servers, printers, monitors, and other network hardware all come to the end of their life eventually. So, what are you supposed to do when you are done using them? Many people want to donate their old computers and network equipment, or recyc...

  • Business Continuity vs Disaster Recovery vs High Availability – What’s the Difference?
    February 14, 2017 at 6:00 AM

    Most business professionals, including many in IT, interchange and confuse the meanings of business continuity, disaster recovery, and high availability. Each term has a unique meaning, although their individual functions do coexist with each other.

    ...
  • Pros & Cons of BYOD
    January 3, 2017 at 8:00 AM

    Many companies struggle weighing the pros and cons of a BYOD (Bring Your Own Device) policy, seeing a potential large cost savings of not purchasing numerous phones, laptops, tablets, and data plans. However, that cost savings may come at a much higher ...

  • 15 Common Mistakes IT Pros Make in Disaster Recovery
    December 27, 2016 at 2:00 PM

    Before we get into the common mistakes that IT professionals make in disaster recovery (DR), let’s talk about the importance of DR itself.

    Companies face three different types of disasters:

  • What is a DDoS attack and why should you care?
    December 6, 2016 at 2:00 PM

    It seems like we hear about large scale DDoS attacks on the national news monthly these days; they are no longer merely mentioned on the IT web forums. Hackers are targeting large enterprise networks for attention and for money. They are also going afte...

  • 3 Types of Disasters That Can Destroy Your Business
    November 15, 2016 at 2:00 PM

    Since we live and work in New Orleans, we’re obviously familiar with hurricanes and flooding. Because of these natural disasters, business owners are knowledgeable about backups. However, many do not realize the vital importance of good backups until it...

  • How Much Does Data Recovery Cost?
    October 25, 2016 at 8:00 AM

    In today’s data-driven business world, most businesses rely heavily on their data and they cannot operate without it. Few companies today can work even a short period of time on paper and most businesses can’t survive a complete loss of data. In fact, m...

  • 3 Places to Backup Your Company's Data
    October 4, 2016 at 8:00 AM

    Here at My IT, we live and die by the phrase, “If my data survives, my company can survive.” Today’s businesses aren’t offices, storefronts, furniture, and inventory. Instead, businesses are intellectual property, client lists, orders, accounting, and y...

  • Biggest Security Risk: Your CEO
    August 22, 2017 at 12:00 PM

    Research on Cybersecurity repeatedly shows that a company’s biggest asset is also their biggest risk, their employees. Companies are more susceptible and more likely to be attacked internally by an employee, whether malicious or accidental, than by a ha...

  • What is a Good Internet Speed for My Business? Q&A
    November 1, 2016 at 8:00 AM

    It would be nice if the IT indu...