A 5-minute Tour of Desktop Virtualization for Growing Businesses

Today work is more than just an office job. It’s a last-minute email sent on the way in; a conference call joined from a business trip; a project handed in from an off-site meeting. Work is everywhere, which is why your team works best when it has easy access to data and applications from as many devices as possible. 

Read More

Three Big Security Lessons for Growing Businesses

Ransomware is the fastest-growing and most pervasive cyber threat in the world. Recently, it has infected the likes of FedEx, Deutsche Bahn and Britain’s National Health Service. The thing is, you don’t need to be a national bank or healthcare provider to fall prey to ransomware – or any other malware. In fact, small and medium-sized businesses are just as likely (if not more) to be attacked. And they’re far less likely to recover from an attack. (We aren’t saying any of this to scare you. We just think you should know what you’re up against.)

Read More

Why Cloud Security is Better Security

When the ransomware attack WannaCry hit last year, it shook the world and brought a number of established institutions to their knees.  If you watched the news unfold thinking, ‘That’ll never happen to my business’, you probably aren’t alone. But you’re also probably wrong. The truth is, the odds aren’t in your favor. Malware attacks like ransomware target businesses of all sizes, at random, and they’re on the rise.  What’s more, growing businesses like yours are both more likely to fall victim to these attacks and less likely to recover quickly.

Read More

Access Reviews: Protecting Against needless Internal Security Vulnerabilities

Our Compliance Consultant, Joe Dylewski of ATMP Solutions, was telling us recently about an often unrecognized or forgotten internal security vulnerability that occurs at many companies. When employees change positions or leave the company entirely, the access they require to systems and applications also changes. But, too often, and especially when an employee changes positions within a company, previous access rights are not changed. Each failure to keep access privileges current introduces a risk.

Read More

The Importance of Security Awareness Training

Is it surprising to know that over 90% of all information security incidents are the result of human error? Whether the root cause of incidents and breaches is ransomware, lost or stolen workstations, inadvertently sending sensitive information via email, or phishing, the more all of us can be informed of the potential vulnerabilities, the more we can do to eliminate these occurrences. Your organization should routinely offer training in the form of classroom presentations, webinars, or security briefings. The importance of this training cannot be understated.

Read More

About this Blog


How can you leverage The Cloud? How will you get there? What will protect you from disaster? Your cloud journey can start anywhere and evolve. CloudSAFE can help you no matter where you start or where you want to go.

Everyone says you need to be in The Cloud. But why? And how? CloudSAFE can help you determine what that means to your company and the best way to get there. The Cloud can be a powerful tool. It provides flexibility, security, capacity and it’s cost effective, enabling you to avoid capital investment. But the question remains, what is right for your company? Contrary to popular opinion, The Cloud is not one size fits all. CloudSAFE has a broad range of solutions and services focused on IT Business Continuity and Infrastructure as a Service.

CloudSAFE believes The Cloud is not “One Size Fits All”. Follow us on our blog and see what else we believe in, and be sure to share your feedback with us.

Subscribe to Email Updates

Recent Posts