Blog
Stay current with the latest in technology and cybersecurity.
One truism that can hurt any business is, “You don’t know what you don’t know.” Often, over time, we work in systems we’ve grown used to, sacrificing potential productivity for familiarity and comfort. That’s what Tom Jarry, Director of Engineering, recently encountered with a mid-sized manufacturing client with about 50 employees. “We completed a Technology…
Cybersecurity For Business: Five Signs You’ve Been Hacked
January 28 was Data Privacy Day in 2018, which meant the start of a new year – What better time for implementing resolutions and fresh starts?! If you resolved to be more vigilant this year by putting a high priority on your cybersecurity efforts, it is hopefully not too late. That said, we really hope…
Is a BYOD Policy Right for Your Business in 2018?
As 2017 winds down, it is time to forecast the workplace technology trends for 2018 and anticipate how these trends can impact your small business. One of the biggest trends is Bring Your Own Device, or BYOD. Being that we are in the business of making sure you are prepared for what the changing technology…
Cybersecurity For Business: 3 Best Practices For Safe Online Shopping
Online shopping opens the potential for you to be phished and scammed into losing control of your information. Here are 3 keys to successfully safe online shopping this season!
Cybersecurity For Businesses: How To Avoid Technology Security Risks
There’s more to business security than putting in place a firewall and some security software and hoping it wards off attacks and other threats. To achieve this, initial and ongoing testing has to happen and the follow-through thereafter is key. Here’s how to determine if your business is really ready to combat threats and stay…
IT Monitoring & Management For Business: What’s Lurking In Your Devices
Do you know every web application your employees are using? There is a high probability that your workforce is utilizing many devices and applications without explicit approval. Collectively, these programs and devices are called Shadow IT. Shadow IT is essentially any application employees download or IT service they sign up for without vetting by your…
How we helped an education transportation company standardize and streamline their IT infrastructure and systems to scale and grow.
Van Pool provides safe, reliable, and cost-effective transportation services for children with special needs to and from schools all over Massachusetts and Connecticut. Van Pool was experiencing three major technology issues, which included failing hardware, slow access to data and business applications and a need to migrate their database to the cloud. They were looking…
The Equifax Breach: What You Need To Know
The Equifax breach that we learned about late last week affected an estimated 143 million Americans. This translates to over 40% of the population’s worth of data in our country. As of noon on Monday, September 11, 2017, the culprits have yet to be identified. The severity of the Equifax breach, in particular, is that…
Cooperative Systems Exclusive on Worldwide Business with kathy ireland®
Worldwide Business with kathy ireland®: See Cooperative Systems Discuss How They Help Empower Businesses with Their Managed Technology Services Aired on Fox Business Network as sponsored programming on Sunday, August 13, 2017. Airing on Bloomberg International on Sunday, August 20, 2017. Worldwide Business with kathy ireland® has announced their exclusive story featuring Cooperative Systems! President Robert…
Cooperative Systems Ranks Among Top IT Service Providers Worldwide
The 10th Annual MSPmentor501 2017 Ranking and Study has identified and released the list of the world’s most progressive Managed Service Providers (MSPs) in Information Technology. Cooperative Systems is among the top 250 companies from around the world featured on the MSPmentor 501 2017 list. “On behalf of MSPmentor, I would like to congratulate Cooperative…
Massive Yahoo Data Breach Caused By ONE Wrong Click
In November Yahoo got to the bottom of a major hack that sacrificed the security of millions of user accounts. They discovered through computer forensics research that one billion accounts were stolen… TWO YEARS PRIOR, in 2013. What Data Was Hacked? No bank or payment details were compromised directly, but the breach undoubtedly exposed names,…
Should I Use Software-As-A-Service or Standalone Applications?
SaaS is a way of delivering software applications over internet connection, meaning that it’s accessible wherever online connectivity is. Consider these as alternatives to your standalone apps or isolated documents to fuel your productivity and run your business.
2017 Best Place To Work in Connecticut
For the fourth year in a row Cooperative Systems has earned a spot on the list of Best Places to Work in CT! Look for us in the March issue of Hartford Business Journal, where you will be able to find the Best Places to Work in CT 2017 rankings.