Posted by

Top Tips & How-Tos of the Week for Buffalo, NY IT Pros (Mar. 22nd 2017) Feature

Here are the Top Tips & How-Tos of the Week for Buffalo, NY IT Pros (Mar. 22nd) as based on the story’s likes, shares, and interactions from our social media sites. The content provided is mainly for Buffalo-Based IT Professionals to help keep them informed as they continue to impact and grow Buffalo’s tech reputation. We provide IT Staffing services and Business Tech Support for businesses in the Buffalo area.

Lack of Action is No Way to Protect Data

An actual statement a client recently said to one of my team members was, “We don’t need a plan, we have insurance.” My team member was speaking to this client about their data security, breach readiness, breach mitigation and breach response plan. The client’s attitude was astonishing. She was washing her hands of any responsibility for securing her company’s information. In the last two years, we’ve seen all kinds of new insurance products to cover data breaches (and fallout from them). Some are pretty good but others not so much. Read More

8 Tech Support Best Practices

No product or service – or end user – is perfect. This is especially true when it comes to hardware and software. That is why companies, if they want to stay in and grow their business, need to provide help to customers when things go wrong. And while no two products or problems are exactly alike, the best tech support departments share the following eight traits. “The ubiquity of instant communication channels has meant that people want to get the support they want, whenever they want and through whatever method is most…Read More

Big Data: The Key to Better Cybersecurity?

The challenges surrounding cybersecurity keep getting more complex, forcing security experts to constantly boost their knowledge in order to defend their systems. The number of potential security holes has also multiplied: whereas in previous years a security team would only have to secure an on-premises datacenter with a few entry points, vulnerable technology today includes everything from smartphones and wearables to cars. And it’s not only end users who are under attack, pointed out James Stanger, senior director of products…Read More

Vastly Improve Your IT Security in 2 Easy Steps

It’s a rough number, but I’d wager that 99 percent of computer security risk in most organizations can be attributed to two root causes: social engineering and unpatched software. I’m not talking about pure numbers of success exploits, but overall impact. Many CISOs and threat intelligence analysts have told me that 100 percent of the biggest events at their company involved social engineering. Certainly, bad things enter your environment through other means, which is why we still need to secure our servers, encrypt our disks, and prevent…Read More

CIOs Should Make 5 Changes to IT Funding in an Age of Digitization

Most organizations realize that digitization means change. Not just to products and channels, but also to operations – especially in IT. But there is one change that many organizations have ignored: Digitization requires a new approach to funding IT. CIOs are shifting focus from projects to products. In product-based IT teams, staff, and processes are organized to deliver and constantly improve a set of product lines that enable business capabilities and outcomes. At the same time, CIOs are ramping up IT’s speed and flexibility…Read More

The Lighthouse Technology Services IT Jobs Blog

Search Jobs

Leave a Reply

Your email address will not be published. Required fields are marked *