Sort by

Avoiding the Pitfalls of a Cloud Migration

11.17.2017 | Staff Contributor

As we move into the “Late Majority” phase of Cloud adoption (see Everett Rogers’ Theory of Diffusion Scale) many organizations find themselves struggling to make the jump from a few dispersed Cloud applications, to a fully integrated Cloud solution. One […]

Read More
Deploy a managed antivirus

Why Deploy a Managed Antivirus Solution? Four ways you’ll benefit (& one you won’t expect!)

10.25.2017 | Staff Contributor

With a multitude of software choices available, the challenge for CIOs and IT directors isn’t necessarily how to safeguard their organization, but rather how to effectively manage their security solution and ensure their infrastructure, and an ever-changing list of end […]

Read More

The lesson to learn from Equifax is its culture. Three takeaways to improve yours…

09.29.2017 | Staff Contributor

With details of the Equifax breach still surfacing, it’s apparent the incident could have been far better contained, if not prevented. As we learn about the culture, a picture emerges of an organization so intensely focused on growth that it […]

Read More

Ransomware: Understand the business model & realize why your organization may be on someone’s list.

09.14.2017 | Staff Contributor

According to a study by Osterman Research, Ransomware ranks as a top security issue facing mid-size organizations in the US, with 74 percent of companies stating they’re “concerned” about the issue. It’s understandable, as roughly 20 percent of companies hit […]

Read More

What Does NY’s New Cybersecurity Regulation Mean for Jersey Businesses?

08.03.2017 | Staff Contributor

Beginning this month, The New York State Department of Financial Services (NYS DFS) is requiring all licensed organizations to “implement a robust cybersecurity plan that protects their business as well as non-public client information…”  Title 23 /Section 500, requires all […]

Read More

Why are You Migrating to the Cloud?

07.10.2017 | Staff Contributor

We’re all aware of the technical advantages cloud computing offers. Accessibility, security, scalability, cost, reliability, etc. But none of these ‘technical benefits’ answer your question – not from a holistic perspective, and that’s the critical piece. Any major infrastructure change […]

Read More

Turning your weakest link into your strongest, that’s transformative!

06.15.2017 | Staff Contributor

Cybersecurity and the importance of employee training & appreciation —  Gartner (@Gartner_inc) defines cybersecurity as “a broad range of practices & concepts designed to protect the data & technology operations of your business.” As criminals continue to target the user […]

Read More

New Jersey State Bar Annual Meeting (May 17 – 19, 2017)

05.01.2017 | Staff Contributor

Join us in the Tech Lounge for a conversation on the importance of technology alignment & how it impacts your firm. The NJSBA Annual Meeting and Convention is the place to be each year for education, CLE credits, networking, the […]

Read More

Implementing a Cybersecurity Solution? How “ARM Strength” dictates posture, and why that matters.

04.17.2017 | Staff Contributor

Moving into the second quarter of 2017, cybersecurity continues to surface as a critical topic of conversation, specifically with and clients and prospects in the insurance, legal and financial industries. With early adopters going through their second (or even third) […]

Read More

Cybersecurity Filings for New York Licensed Organizations

04.10.2017 | Staff Contributor

Your company may be required by New York State to review its cyber profile and implement a cybersecurity plan to assess and remediate vulnerabilities and protect your organization moving forward. The regulation is designed to promote the protection of client information […]

Read More