Blog
Stay current with the latest in technology and cybersecurity.
One truism that can hurt any business is, “You don’t know what you don’t know.” Often, over time, we work in systems we’ve grown used to, sacrificing potential productivity for familiarity and comfort. That’s what Tom Jarry, Director of Engineering, recently encountered with a mid-sized manufacturing client with about 50 employees. “We completed a Technology…
Crime During Tax Time: 10 Essential Steps To Avoid Criminals This Tax Season
We’re All At Risk “Nothing can be said to be certain, except death and taxes.” -Benjamin Franklin Tax season is stressful enough as it is. Putting personal, tax or financial data in the mail, online, or offering over the phone can be dangerous! This can exacerbate tax season woes with unwanted additional worry and risk…
Cybersecurity For Businesses: How Wearable Technology Could Threaten Your Business Data
You’ve probably seen the new smart watches that people are wearing and you might ask yourself, “What’s so special about wearable technology devices and do I need one?” Wearable technology is typically meant to perform the various functions of a smartphone, minus the phone. Some devices are even used to monitor the body’s physical activity…
2016 Top 10 Channel Threats: Number 7
New Year, New Channel Threats To close out their 2015 threat landscape review, Channelnomics is counting down the Top 10 Emerging Threats For The Channel in 2016. They have consulted expert security providers, including Cooperative Systems’ own Bob DeLisa, to highlight these channel threats so you will know what to look out for in the…
2016 Best Place to Work in CT
Top 10 Best Places to Work in CT 2016 We are excited to announce that we are listed among the Best Places to Work in CT 2016, ranking on this list for the 3rd consecutive year! This survey and awards program identifies, recognizes, and honors the best employers in Connecticut. We have been named one…
What Every CEO Should Understand About Security
Every CEO Should Define and Manage Risks This whitepaper presents a top-level review of key aspects of cyber resilience for every CEO: information-sharing, planning, skill and the economics of cyber security. We offer a number of recommendations for the private and public sector, urging both to engage in discussion of corporate responsibility and balanced policy…
Dorkbot Botnet Disrupted
The above image is a heat map representing Dorkbot machine detection for the past three months globally. (source: MMPC) Global Operation Takes Down Dorkbot This post summarizes the significant cross-organizational efforts required to disrupt just one family of malware out there. What is Dorkbot? Win32/Dorkbot is an Internet Relay Chat (IRC) botnet. The worm…
Channelnomics Interview: Microsoft in the Cloud Space
Is Microsoft ‘coming back to life’ in cloud space? Channelnomics recently interviewed Cooperative Systems’ Bob DeLisa regarding Microsoft’s current status in the cloud space. Here’s what Bob had to say. — As a Managed Services Provider (MSP) serving local small and medium-sized businesses (SMB’s) our relationships with our customers are personal and connected. We view…
‘Tis the Season for Consumer Scams
10 Tips to Protect Your Assets This Holiday Season With Black Friday and Cyber Monday fast approaching the FBI and the Better Business Bureau released an annual warning to shoppers highlighting some of the consumer scams and threat scenarios shoppers may encounter. We’ve reviewed these and other lists, done the research, and put together…
Setting the Standard in Compliance
A Case Study Highlighting Compliance Excellence Ingram Micro recently featured Cooperative Systems among the top 50 in 2015 on their SMB 500, an annual list recognizing and ranking the top 500 fastest growing Ingram Micro SMB channel partners in the U.S. In conjunction with this achievement, Cooperative Systems has been setting the compliance standard. This…
Cybersecurity for Business: A Teenager Hacked The CIA
You Could Be Hacked, Too With new threats emerging all of the time, it’s no wonder that cybersecurity is such a major part of any technological endeavor. Your should be using the most powerful security solutions on the market in order to avoid intensive hacks. Despite the emphasis that our society places on security, it…
Technology Security for Businesses: Top IT and Technology Best Practices
The Best Practices To Secure Your Business Look no further. Our IT staff has assembled these 5 core recommendations through years of experience supporting bank and credit union IT infrastructure and people. Make it everyone’s business We put this first because we’ve seen too many experts neglect this one or leave it at the end…
IT and Technology for Business: Tip of the Week – Eliminating Distractions
Stop Distracting Yourself In today’s competitive workplace environments, productivity is at a premium and workplace distractions are aplenty. Thanks to our gadgets, the allure of the Internet, and of course having to interact with people, working at the modern office isn’t without it’s fair share of diversions. These hinder productivity. Here are three tips that…