Blog

Stay current with the latest in technology and cybersecurity.

My DEF CON Experience: Seeing Security Through New Eyes

November 1, 2024

How often do we get the chance to go behind enemy lines and see how the other side works? Coopsys Security Technician Vitor Brandao did just that, attending DEF CON 32 this past August in Las Vegas.  DEF CON is perhaps the most well-known hacker conference in existence. Debuting in 1993, the iconic event has…

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Backup & Disaster Recovery For Business: The Most Important Step When Disaster Strikes Your Technology

May 19, 2016

Imagine that by the end of this blog piece, you will be a more effective IT decision-maker…all because you learned about one very important aspect of your daily IT-grind and why this is so crucial. Not only can you learn the in’s and out’s of BDR here, but we also invite you to check out…

4 Must-Have’s Of Every Successful Disaster Recovery Plan

May 12, 2016

  Previously, we explained why it’s prudent for your business to have a backup and disaster recovery (BDR) plan in place with the help of a managed service provider (MSP). Since there’s no perfect way to plan for the future, take what steps you can now to protect the business you run. To ensure that…

Preparing For A Storm: Why Your Business Needs A Disaster Recovery Plan

May 4, 2016

Without a backup and disaster recovery (BDR) plan your business may be left crippled in the face of a calamity. Your entire business organization can be completely shut down.

How quickly your organization can bounce back depends on your commitment to emergency planning TODAY.

lock on rusty door strong passwords

How to Choose Strong Passwords: 5 Core Tips

April 21, 2016

May 5 is the third annual World Password Day. If you care about protecting your accounts, your personal identifying information, and your business, this your official reminder: Please be more thoughtful about choosing passwords! Now that we’re well into 2016, we are all privvy to the list of the top 10 worst passwords from 2015.…

Every Computer User Should Know NOT To Do These Three Things

April 14, 2016

Knowing how to properly use your computer is key to your productivity and its longevity. You should never take for granted basic best practices. Here are three basic computer guidelines that are easy to overlook, yet they can be critical to performance and security. Don’t Just Blindly Click We get it: It’s unreasonable to expect…

Build A Security Program

March 31, 2016

We identify symptoms of security theater, discuss the responsibilities of a real security program, and offer these essential business lessons worth considering when shifting from security theater to a truly more secure organization.

technology-up-to-date

3 Ways to Ensure that Your Technology Doesn’t Get Stuck In the Past

March 24, 2016

Keep Your Technology Up To Date The purpose of business technology is to propel an enterprise into the future. Yet, too many businesses are reluctant to make major adjustments to their current IT systems, wrongly believing that it’s not worth the investment. Don’t get stuck in the past. The best way to approach upgrading is…

4 Email Mistakes And How To Avoid Them

March 17, 2016

Email is being used as a communication staple for businesses around the world. People are finding it increasingly common to make and observe simple mistakes that can be easily avoided with proper training. It is best practice to ensure that your team is adequately trained on how to efficiently use your email client to its…

Private Browsing Mode: Is Secrecy Security?

March 11, 2016

Is Privacy Mode Safe? There are plenty of reasonable explanations for why you’d want to browse the web in a private session. Maybe you’re on the hunt for the perfect gift and you want to keep your searches a secret from your significant other, or you’re on a public machine and are afraid you’ll forget…

Improve Customer Experience With Guest Wi-Fi

March 3, 2016

As a business owner who uses WiFi, you rely on your router to reliably broadcast a network connection to your entire office. This is, we hope, a private network that you won’t want to share with just anyone. Well, guests visiting your office might want to use the wireless internet and allowing them to use…

Don’t Just Chuck Your E-Waste In The Trash Can

February 26, 2016

Electronic Waste Doesn’t Belong In The Garbage Today’s best practices for business include upgrading equipment when warranties are expired, materials fail, or a newer solution is a better fit. Businesses, we would hope, want to keep up with technology and trends to improve operational efficiency; however, this can result in significant e-waste. What is E-Waste?…

Crime During Tax Time: 10 Essential Steps To Avoid Criminals This Tax Season

February 18, 2016

We’re All At Risk “Nothing can be said to be certain, except death and taxes.” -Benjamin Franklin Tax season is stressful enough as it is. Putting personal, tax or financial data in the mail, online, or offering over the phone can be dangerous! This can exacerbate tax season woes with unwanted additional worry and risk…