A VPN is a must have for remote access to the office, but what about just when you are connected to the Internet? Many vulnerabilities are exposed whether you're at home or on the road, over your latest web-enabled device. We have used ExpressVPN on the Apple platform including various versions of devices and operating systems. The software requires a few minutes to install and allows you to select from many server locations in the world, not only hiding your physical locati
This winter the Chicagoland area saw temperatures 25 below zero. Many companies, schools and municipalities closed because of the various dangers associated with such bitter weather. Don’t get me wrong, it gets cold in Chicago, but rarely to this extent. When no one shows up at your office, school or government building for a day or two, under such extreme cold conditions, there might be a very unpleasant surprise waiting for the first person to return. Pipes can freeze, pot
In recent months, we have worked with a new product by Mersive Technologies called the Solstice Pod. We implemented it in conference room setups at a law firm as an additional resource for meetings. Since then, the device has provided new meaning to "collaborating" in the work environment. Screen sharing technology continues to evolve but the Solstice device has removed the limitations that most screen share devices, such as Apple TV or Chromecast, have for any user. The So
With a location move from a serviced office space to a standalone office, we were able to manage all aspects of technology. We implemented a new ISP with a new Mitel Cloud VOIP Hosted PBX system with mobile forwarding for after hours scheduling. This small setup included a wireless access point and a new firewall to support a VPN connection back to their HQ office.
The way an organization approaches its security policy effects the way it is perceived in the cyber environment and the strength it has to resist attacks. Establishing stringent policies and procedures, and well-trained user awareness are vital for reacting to incidents and maintaining security levels. Without maintaining constant vigilance and self-maintenance, it can be easy for a company to slip away from its established security baseline, unaware of vulnerabilities and un