Remembering 9/11

On the anniversary of 9/11 I am reminded of the important role technology infrastructure plays in protecting our country. Our next big attack on the U.S. could very well come from our computers and not an airplane or bomb. It could affect millions not thousands of U.S. citizens.

Malicious actors are all around us, recent data breaches at CitiGroup, Home Depot, Target, Ashley Madison and others have caused grief and financial ruin and in some cases suicide.

I decided I needed to get involved and try to do something to help protect our country. We regularly deal with financial and manufacturing organizations and have been providing Internet and Hosting services for 20 years, as a result we are often involved in attacks and investigations. About 6 months ago I applied to be a member of Infragard and yesterday I was accepted as one of the 50,000 members helping to protect the U.S.

Infragard is a non-profit organization run by the US Federal Bureau of Investigation. The FBI created Infragard in 1996 to assist the private sector with cyber defense. It is an association of persons who represent businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the U.S.

PICS ITech excels in this area of technology consulting. We’re constantly expanding our knowledge base with information from an array of sources, including Infragard. We work with our clients evaluating needs and helping each company find the strategic and tactical approaches that enable them succeed while protecting the data and reputation of the organization.

What is the right investment in this area? How much insurance is too much insurance? What parts of your systems might require special attention, and what governance protocols need to be put in place to administer this? We’ve become very good at helping our clients answer these questions. Here is the Top 5 low-cost or no-cost improvements you can make in your company to improve security. If you need help implementing them or you would like to make IT a competitive advantage for your company call us today to find out how we can help you.



Increase staff efficiency with technology

164 BizV_BWhen it comes to increasing your employees’ efficiency and productivity, technology can provide countless opportunities to streamline workflows, eliminate redundant processes and reduce costs within your organization. If you’re looking to stay ahead of the competition, you need to ditch the traditional ways of working and implement technology to your practices to encourage more employee productivity - here’s how.

Read more...



Office Mobile released for Windows 10

164 BizV_BMicrosoft has released Office Mobile apps as part of the worldwide rollout of Windows 10. Tablet users with Windows 10 can enjoy free access to the mobile versions of Microsoft’s popular Word, Excel, PowerPoint and OneNote applications. The mobile version of these applications is designed with a “touch-first’ interface to improve functionality for tablet users while providing all the Office features you would find on your desktop computer.

Read more...



Three types of business dashboards

O365_164_BAs you seek to better understand your customers and make more informed business decisions, dashboards are a critical addition to your business intelligence toolbox. But there are many types of dashboards out there, each with unique purposes - how do you determine which one is best for your company? We’ve listed three of the most widely used dashboards below.

Read more...



How to grow your email list with social media

Productivity_Mar25_BThe coveted email list: it can be the difference between a growing business and one that sputters out before it gets off the ground. So what can you do to grow yours? Although it’s often less talked about, social media can be an instrumental tool to gain subscribers. Here are three tips on how you can use it to grow your email list.

Read more...



Now two-factor authentication is easy

SocialMedia_Mar16_BWith cyber attacks becoming more and more common, using a single password to logon to online services is becoming a less effective security measure. Enter two-factor authentication. However, those who’ve used this security process know how much of a hassle it can be - adding additional time to every single login. But not any longer. A small hardware device known as a Yubikey intends to make two-factor authentication easier than ever.

Read more...