Optimal Insights

Plain-English answers to your questions about technology best practices.

3 Easy Steps to Improve Network Security

  Every. Single. Time. Every single time I open a news website or publication, I learn about yet another cyber-attack. Based on this, I’m not surprised that a recent Symantec study found that 40% of cyber-attacks are against organizations with fewer than 500 employees. And, according to the National Cyber

Learn More

How to Test a Disaster Recovery Plan for Small Businesses

  Forrester data from March 2015 shows that 63% of SMBs, globally, consider purchasing or upgrading their disaster recovery or business continuity capabilities to be a high or critical priority. Top drivers behind the need to improve disaster recovery capabilities are regulatory and legal pressures (38%), fiduciary responsibility to various

Learn More

How to Safely Share Passwords

  Recently, we published an article detailing the key elements of a successful password policy. With the increasing frequency (and severity) of cyberattacks, this is a hot-button issue. No matter how strong your passwords may be, however, you won’t be protected from much of anything if they find their way

Learn More

How to Test a Disaster Recovery Plan for Law Firms

Disasters can be, well, even more disastrous to law firms because their responsibility to protect client data does not dissipate post-disaster. In fact, former ABA President Steve Zack was quoted as saying, “They [law firms] must represent the client competently and diligently, safeguard client’s property, and maintain client confidentiality and

Learn More

Microsoft Office 365 vs. Hosted (Cloud) Desktops for Business

A cloud is a cloud is a cloud, right? Absolutely and positively not. Especially not when what is being advertised as a “cloud” solution is really only partially rooted in cloud computing. When it comes to really digging into Microsoft Office 365 and a hosted desktop platform (otherwise referred to

Learn More

Key Elements of a Successful Password Policy

  Did you know that specialized computers can crack an 8-character password in 6 hours? If there’s one thing that hackers have an ample amount of, it’s patience. And yes, your organization is vulnerable; many small businesses serve as vectors into larger corporations, and cybercriminals tend to pursue the path

Learn More
No posts to show