Blog

Stay current with the latest in technology and cybersecurity.

4 Cybersecurity Myths That Could Leave Your Business Exposed

May 22, 2025
myths

“We have antivirus, so we’re covered.”“Hackers only go after large companies.”“That’s IT’s job, not mine.”“If we get hit, our cyber insurance will handle it.” Sound familiar? If so, you’re not alone. These are just a few of the most common cybersecurity myths that businesses continue to believe. And unfortunately, they create a false sense of…

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

lock on rusty door strong passwords

How to Choose Strong Passwords: 5 Core Tips

April 21, 2016

May 5 is the third annual World Password Day. If you care about protecting your accounts, your personal identifying information, and your business, this your official reminder: Please be more thoughtful about choosing passwords! Now that we’re well into 2016, we are all privvy to the list of the top 10 worst passwords from 2015.…

Every Computer User Should Know NOT To Do These Three Things

April 14, 2016

Knowing how to properly use your computer is key to your productivity and its longevity. You should never take for granted basic best practices. Here are three basic computer guidelines that are easy to overlook, yet they can be critical to performance and security. Don’t Just Blindly Click We get it: It’s unreasonable to expect…

Build A Security Program

March 31, 2016

We identify symptoms of security theater, discuss the responsibilities of a real security program, and offer these essential business lessons worth considering when shifting from security theater to a truly more secure organization.

technology-up-to-date

3 Ways to Ensure that Your Technology Doesn’t Get Stuck In the Past

March 24, 2016

Keep Your Technology Up To Date The purpose of business technology is to propel an enterprise into the future. Yet, too many businesses are reluctant to make major adjustments to their current IT systems, wrongly believing that it’s not worth the investment. Don’t get stuck in the past. The best way to approach upgrading is…

4 Email Mistakes And How To Avoid Them

March 17, 2016

Email is being used as a communication staple for businesses around the world. People are finding it increasingly common to make and observe simple mistakes that can be easily avoided with proper training. It is best practice to ensure that your team is adequately trained on how to efficiently use your email client to its…

Private Browsing Mode: Is Secrecy Security?

March 11, 2016

Is Privacy Mode Safe? There are plenty of reasonable explanations for why you’d want to browse the web in a private session. Maybe you’re on the hunt for the perfect gift and you want to keep your searches a secret from your significant other, or you’re on a public machine and are afraid you’ll forget…

Improve Customer Experience With Guest Wi-Fi

March 3, 2016

As a business owner who uses WiFi, you rely on your router to reliably broadcast a network connection to your entire office. This is, we hope, a private network that you won’t want to share with just anyone. Well, guests visiting your office might want to use the wireless internet and allowing them to use…

Don’t Just Chuck Your E-Waste In The Trash Can

February 26, 2016

Electronic Waste Doesn’t Belong In The Garbage Today’s best practices for business include upgrading equipment when warranties are expired, materials fail, or a newer solution is a better fit. Businesses, we would hope, want to keep up with technology and trends to improve operational efficiency; however, this can result in significant e-waste. What is E-Waste?…

Crime During Tax Time: 10 Essential Steps To Avoid Criminals This Tax Season

February 18, 2016

We’re All At Risk “Nothing can be said to be certain, except death and taxes.” -Benjamin Franklin Tax season is stressful enough as it is. Putting personal, tax or financial data in the mail, online, or offering over the phone can be dangerous! This can exacerbate tax season woes with unwanted additional worry and risk…

wearable technology watch with phone

Cybersecurity For Businesses: How Wearable Technology Could Threaten Your Business Data

January 19, 2016

You’ve probably seen the new smart watches that people are wearing and you might ask yourself, “What’s so special about wearable technology devices and do I need one?” Wearable technology is typically meant to perform the various functions of a smartphone, minus the phone. Some devices are even used to monitor the body’s physical activity…

2016 Top 10 Channel Threats: Number 7

January 12, 2016

New Year, New Channel Threats To close out their 2015 threat landscape review, Channelnomics is counting down the Top 10 Emerging Threats For The Channel in 2016. They have consulted expert security providers, including Cooperative Systems’ own Bob DeLisa, to highlight these channel threats so you will know what to look out for in the…

2016 Best Place to Work in CT

December 30, 2015

Top 10 Best Places to Work in CT 2016 We are excited to announce that we are listed among the Best Places to Work in CT 2016, ranking on this list for the 3rd consecutive year! This survey and awards program identifies, recognizes, and honors the best employers in Connecticut. We have been named one…