Thrive is currently ranked among the top 100 IT Managed Service Providers globally. Our Mission is to become the most respected and referred technology solutions firm serving mid-market, enterprise, and emerging customers in the Northeast United States.

1-866-205-2810

info@thrivenetworks.com

25 Forbes Boulevard, Suite 3 Foxborough, MA 02035

Top
 

Author: Chris Moore

Check Your Cloud Permissions!

As we are seeing by the recent breaches of well-known brands the public clouds are becoming the source from which the data is being obtained.  The easy way to describe what has been happening is a cloud version of a file server has been populated with sensitive files and then permissions were set to allow a very large number of people access to those files.  These recent breaches are not the direct fault of the cloud vendor but rather humans or processes created by humans not knowing how to configure proper security within the clouds. 

Cloud Infrastructure is Inherently Redundant, is Your Server Room?

cloudAs we enter winter each year, it is an appropriate time to review what you will do under disaster type circumstances.  There are many things to consider when putting together a disaster plan, but one of the most basic IT requirements is power. Without power very few things can happen these days.  The reality is that your power will most likely go off at some point during the year for something other than being affected by a nor’easter.  If you were to be without power for seven to ten days because of fire at a power substation would that impact your business?  What about no power for 24 hours during your high season after a car strikes a telephone pole?  What if lightning struck your building and took out your main power panel?

When in Doubt, Throw it Out – Or Call and Confirm!

Are you aware that October is National Cybersecurity Awareness month?  With the day to day security headlines year-round you may be thinking to yourself “I am sick of hearing about security”.  As we come to the end of the month, bear with me for just a second as I let you in on a little security gem.  While there are many different security solutions that exist, some cheap and many expensive, yet arguably one of the most important ones is free.  It is a phrase coined by the National Cybersecurity Alliance, “When in Doubt, Throw It Out”.  When at home or work, if you receive a piece of physical junk mail that that claims you have one a free trip to the Moon, what do you do?  Most likely, you throw it out in the trash as you know it is not true.

The Low Hanging Fruit of Cybersecurity Part 3 of 3: Security Awareness Training

Over the course of this three-part series, we have explored security measures to help keep your organization better protected from cyber criminals. In part one, we examined the importance of patching, and in part two,we explored advanced email security. In this final part of the series we will cover security awareness training that should be implemented in every business.

The Low Hanging Fruit of Cybersecurity Part 2 of 3: Advanced Email Security

This three-part series will highlight areas that are easy for Thrive to implement to help keep your business protected from outside threats.  If you missed Part One: Patch, Patch, Patch, we covered the importance of patching your environment to prevent potential disruption or even disaster. This installment, Part Two, will focus on advanced email security; how it developed and why you should ensure to use it in your businesses. Moving forward, Part Three will use this information and detail the proper measures to take when it comes to security awareness training.

The Low Hanging Fruit of Cybersecurity Part 1 of 3: Patch, Patch, Patch

This three-part series will highlight areas that are easy for Thrive to implement in your organization to help keep your business protected.  Part one will cover patching, part two advanced email security, and part three security awareness training.

Just as you could have a hole in a window in your house, you may have one on your servers and computers as well!

Cloud Infrastructure is Inherently Redundant, is Your Server Room?

cloudAs we enter the US hurricane season each year, it is an appropriate time to review what you will do under disaster type circumstances.  There are many things to consider when putting together a disaster plan, but one of the most basic IT requirements is power. Without power very few things can happen these days.  The reality is that your power will most likely go off at some point during the year for something other than being affected by a hurricane.  If you were to be without power for seven to ten days because of fire at a power substation would that impact your business?  What about no power for 24 hours during your high season after a car strikes a telephone pole?  What if lightning struck your building and took out your main power panel?

Snap Away – Two Invaluable Business Apps!

Do you collect business cards and throw them in a drawer in case you ever need them?  Would you like to be able to connect with the person on LinkedIn and get them into your contacts in one action?  Do you have documents that you would like scanned, but do not have a scanner readily available?  If so, we will show you two different methods in which you can capture these types of information on your smart phone. 

What is Needed to Combat the Rise in Shadow Devices

With the rise in shadow devices being used by employees, your corporate network is at elevated risk of an attack.  Shadow devices include all devices not directly issued by the company, but are being used on the corporate network(s). What people do not realize when they bring these devices into the workplace is they open up a potential for ex-filtration of data from the corporate network.