IT Support Blog for Small Business Owners

What is Multi-factor Authentication and Why You Need it Now

Posted by David S. Mulvey on 8/5/20 12:06 PM

If there’s one security feature you must absolutely implement right away it’s multi-factor authentication (MFA). Yes, you could make a case that your firewall, anti-virus, or user management system is the number one security measure. It’s true that you need some of those before you can even get to MFA, but nobody can debate the effectiveness of MFA. 

Read More

Topics: Security threats facing small businesses, IT security, network security, IT Cyber Security, IT Password Security, managed cybersecurity services, cyber security tools, Cybersecurity Risk Assessment, multifactor authentication, security tools, two factor authentication, security features

Is Your Network Security Adequate? Think Again!

Posted by Michael Silverman on 2/18/14 11:06 AM

Back on February 7th, NBC reported on potential security risks at the Olympic Games.  There was a lot of controversy about the article itself, but, accurate or a hoax, IT security doesn’t get the attention it should in small businesses.  More and more organizations, large and small, are being audited either by regulatory agencies or by existing or potential clients.  Years back, news was about virus attacks, followed by malware; today we’re regularly hearing about hacking.  Everyone wants to know their data is secure.

Read More

Topics: data security, IT security, network security, network assessment

Data Security Breaches: Not just a Big Business Threat.

Posted by Scott Persechino on 2/17/14 8:59 AM

If a big company like Target or Neiman Marcus can suffer a Data Security Breach, it can certainly happen to your small company. In fact, it’s probably more likely to happen. And though no business, big or small, is ever guaranteed to be completely protected from a data security breach, if a company does not take the proper proactive security steps, it will almost definitely happen.

Read More

Topics: data security, IT security, network security, data security breaches

Subscribe By Entering Your Email

Follow ANP



Latest ANP Blogs

Browse by Category