A 5-minute Tour of Desktop Virtualization for Growing Businesses

Today work is more than just an office job. It’s a last-minute email sent on the way in; a conference call joined from a business trip; a project handed in from an off-site meeting. Work is everywhere, which is why your team works best when it has easy access to data and applications from as many devices as possible. 

Read More

A 5-minute Tour of File Sharing, Sync and Storage for Growing Businesses

Collaboration is easy when you’ve got a handful of people on your team. No need to chase down projects across departments, no waiting around for a swarm of feedback. Business is swift and agile – it’s what makes your team special. But things change when you start growing. New roles, different responsibilities and a growing number of people make it hard to communicate well. Work becomes a bunch of email threads full of buried attachments and conflicting file versions. Conversations and deadlines get harder to track. Teamwork just isn’t seamless anymore. That’s where ShareFile comes in – a cloud-based service for sharing and storing your critical files. It’s a place where everyone can work better together. That’s because it makes it a whole lot easier to do the five ‘Ss’:

Read More

Three Big Security Lessons for Growing Businesses

Ransomware is the fastest-growing and most pervasive cyber threat in the world. Recently, it has infected the likes of FedEx, Deutsche Bahn and Britain’s National Health Service. The thing is, you don’t need to be a national bank or healthcare provider to fall prey to ransomware – or any other malware. In fact, small and medium-sized businesses are just as likely (if not more) to be attacked. And they’re far less likely to recover from an attack. (We aren’t saying any of this to scare you. We just think you should know what you’re up against.)

Read More

Why Cloud Security is Better Security

When the ransomware attack WannaCry hit last year, it shook the world and brought a number of established institutions to their knees.  If you watched the news unfold thinking, ‘That’ll never happen to my business’, you probably aren’t alone. But you’re also probably wrong. The truth is, the odds aren’t in your favor. Malware attacks like ransomware target businesses of all sizes, at random, and they’re on the rise.  What’s more, growing businesses like yours are both more likely to fall victim to these attacks and less likely to recover quickly.

Read More

Access Reviews: Protecting Against needless Internal Security Vulnerabilities

Our Compliance Consultant, Joe Dylewski of ATMP Solutions, was telling us recently about an often unrecognized or forgotten internal security vulnerability that occurs at many companies. When employees change positions or leave the company entirely, the access they require to systems and applications also changes. But, too often, and especially when an employee changes positions within a company, previous access rights are not changed. Each failure to keep access privileges current introduces a risk.

Read More

6 Tips for Keeping Your Organization Safe with Portable Media

We've all used USB Thumb Drives / Memory Sticks. In fact, you probably have a few in your desk drawer or computer bag. And, if you're like most people, you haven't realized how risky the use of these devices is for your data and your organization. We asked Joe Dylewski of ATMP Solutions, a Michigan-based firm specializing in compliance for HIPAA, ISO 27001, NIST and other technology and data related regulations, about the risks associated with the use of portable media. Here's what he had to say:

Read More

The Importance of Security Awareness Training

Is it surprising to know that over 90% of all information security incidents are the result of human error? Whether the root cause of incidents and breaches is ransomware, lost or stolen workstations, inadvertently sending sensitive information via email, or phishing, the more all of us can be informed of the potential vulnerabilities, the more we can do to eliminate these occurrences. Your organization should routinely offer training in the form of classroom presentations, webinars, or security briefings. The importance of this training cannot be understated.

Read More

How to Protect Against Meltdown and Spectre Vulnerabilities

As many of you have read or heard in the news recently, the Meltdown and Spectre vulnerabilities are a large concern for many organizations and Technology Managers. The issue is not specific to any one vendor and takes advantage of techniques commonly used in most of the modern processor architectures. This means that a large range of products are affected, from desktops and laptops to servers and storage, even smartphones. You should note, and as Intel reports in their FAQ, researchers have only demonstrated a proof of concept.  Here are some suggestions that you and/or your organization can take to help mitigate the risks from the Meltdown and Spectre Vulnerabilities:

Read More

Petya (NotPetya): Yet another reminder - YOU NEED BACKUP!

Another global cyber attack is all over the news today. I'm sure you've heard or read about it. Petya, or NotPetya as security researchers are calling it, is wreaking havoc around the world. And, this ransomware is worse than WannaCry from last month. According to David Kennedy, former NSA analyst and cybersecurity entrepreneur, as quoted on Forbes.com (read the article), "the ransomware finds passwords on the infected computer to move to other systems. It does that by extracting passwords from memory or from the local filesystem, he explained."

Read More

About this Blog


How can you leverage The Cloud? How will you get there? What will protect you from disaster? Your cloud journey can start anywhere and evolve. CloudSAFE can help you no matter where you start or where you want to go.

Everyone says you need to be in The Cloud. But why? And how? CloudSAFE can help you determine what that means to your company and the best way to get there. The Cloud can be a powerful tool. It provides flexibility, security, capacity and it’s cost effective, enabling you to avoid capital investment. But the question remains, what is right for your company? Contrary to popular opinion, The Cloud is not one size fits all. CloudSAFE has a broad range of solutions and services focused on IT Business Continuity and Infrastructure as a Service.

CloudSAFE believes The Cloud is not “One Size Fits All”. Follow us on our blog and see what else we believe in, and be sure to share your feedback with us.

Subscribe to Email Updates

Recent Posts