
Blog
Stay current with the latest in technology and cybersecurity.
Driving Factors in Technology Investment For any business, knowing when to invest in new technology often begins with identifying the key indicators that signal it’s time for change. For manufacturers in particular, external regulations are among the major drivers for IT investment. As Tom Jarry, Director of Engineering at Cooperative Systems, explains, “Our clients might…
Don’t Just Chuck Your E-Waste In The Trash Can
Electronic Waste Doesn’t Belong In The Garbage Today’s best practices for business include upgrading equipment when warranties are expired, materials fail, or a newer solution is a better fit. Businesses, we would hope, want to keep up with technology and trends to improve operational efficiency; however, this can result in significant e-waste. What is E-Waste?…
Crime During Tax Time: 10 Essential Steps To Avoid Criminals This Tax Season
We’re All At Risk “Nothing can be said to be certain, except death and taxes.” -Benjamin Franklin Tax season is stressful enough as it is. Putting personal, tax or financial data in the mail, online, or offering over the phone can be dangerous! This can exacerbate tax season woes with unwanted additional worry and risk…
Cybersecurity For Businesses: How Wearable Technology Could Threaten Your Business Data
You’ve probably seen the new smart watches that people are wearing and you might ask yourself, “What’s so special about wearable technology devices and do I need one?” Wearable technology is typically meant to perform the various functions of a smartphone, minus the phone. Some devices are even used to monitor the body’s physical activity…
2016 Top 10 Channel Threats: Number 7
New Year, New Channel Threats To close out their 2015 threat landscape review, Channelnomics is counting down the Top 10 Emerging Threats For The Channel in 2016. They have consulted expert security providers, including Cooperative Systems’ own Bob DeLisa, to highlight these channel threats so you will know what to look out for in the…
2016 Best Place to Work in CT
Top 10 Best Places to Work in CT 2016 We are excited to announce that we are listed among the Best Places to Work in CT 2016, ranking on this list for the 3rd consecutive year! This survey and awards program identifies, recognizes, and honors the best employers in Connecticut. We have been named one…
What Every CEO Should Understand About Security
Every CEO Should Define and Manage Risks This whitepaper presents a top-level review of key aspects of cyber resilience for every CEO: information-sharing, planning, skill and the economics of cyber security. We offer a number of recommendations for the private and public sector, urging both to engage in discussion of corporate responsibility and balanced policy…
Dorkbot Botnet Disrupted
The above image is a heat map representing Dorkbot machine detection for the past three months globally. (source: MMPC) Global Operation Takes Down Dorkbot This post summarizes the significant cross-organizational efforts required to disrupt just one family of malware out there. What is Dorkbot? Win32/Dorkbot is an Internet Relay Chat (IRC) botnet. The worm…
Channelnomics Interview: Microsoft in the Cloud Space
Is Microsoft ‘coming back to life’ in cloud space? Channelnomics recently interviewed Cooperative Systems’ Bob DeLisa regarding Microsoft’s current status in the cloud space. Here’s what Bob had to say. — As a Managed Services Provider (MSP) serving local small and medium-sized businesses (SMB’s) our relationships with our customers are personal and connected. We view…
‘Tis the Season for Consumer Scams
10 Tips to Protect Your Assets This Holiday Season With Black Friday and Cyber Monday fast approaching the FBI and the Better Business Bureau released an annual warning to shoppers highlighting some of the consumer scams and threat scenarios shoppers may encounter. We’ve reviewed these and other lists, done the research, and put together…
Setting the Standard in Compliance
A Case Study Highlighting Compliance Excellence Ingram Micro recently featured Cooperative Systems among the top 50 in 2015 on their SMB 500, an annual list recognizing and ranking the top 500 fastest growing Ingram Micro SMB channel partners in the U.S. In conjunction with this achievement, Cooperative Systems has been setting the compliance standard. This…
Cybersecurity for Business: A Teenager Hacked The CIA
You Could Be Hacked, Too With new threats emerging all of the time, it’s no wonder that cybersecurity is such a major part of any technological endeavor. Your should be using the most powerful security solutions on the market in order to avoid intensive hacks. Despite the emphasis that our society places on security, it…
Technology Security for Businesses: Top IT and Technology Best Practices
The Best Practices To Secure Your Business Look no further. Our IT staff has assembled these 5 core recommendations through years of experience supporting bank and credit union IT infrastructure and people. Make it everyone’s business We put this first because we’ve seen too many experts neglect this one or leave it at the end…