Understanding Cloud Computing

Brittany Pescetto Uncategorized

Free yourself from traditional IT with Cloud Services Cloud computing is managed, shared applications, development platforms, or computing infrastructure accessible via the internet. It provides options such as bandwidth and on-demand computing power with flexible capabilities normally purchased as a metered service. The National Institute of Standards and Technology (NIST) defines cloud computing as a “model for enabling ubiquitous, convenient, …

Understanding Ransomware

Brittany Pescetto Blog

Like many online attacks, ransomware is very descriptively summed up by its name–simply put, itís malware that allows hackers to demand a ransom. This malware classification follows a simple, but devious, method of attack: the program will encrypt files on the host system and demand that the user pay to regain access to their files, typically asking to be paid …

IT Threat Glossary

Brittany Pescetto Blog

The Internet can be a dangerous place, especially now that hackers are taking advantage of advanced tools and threats. New types of malware, ransomware, and viruses are being created every day, for the express purpose of seeing your organization fail. If your business isnít using comprehensive security solutions, you remain vulnerable to threats that can potentially compromise and damage your …

Understanding the Sarbanes-Oxley Act

Brittany Pescetto Blog

For accountants that deal with publicly owned companies, ensuring your IT infrastructure is SOX-complaint is a must. The Sarbanes-Oxley Act was adopted as law to ensure that investors have reliable data in which to make their financial decisions. The law was, in large part, a result of the accounting scandals that took place around the turn of the century including …

Understanding Network Security

Brittany Pescetto Blog

This can be said for network security. On the surface it might appear to be simply keeping your data safe, but thereís far more to it than that. When you set in motion a plan to secure your companyís network, you should first take into account the protection you need from high-level and low-level threats alike. It likely consists of …

Slow Computer? Increase your memory to boost computer Speeds

Brittany Pescetto Blog, Tip of The Week

Sometimes when your workstation feels bogged down, a relatively cheap and simply hardware update can make a huge difference in performance. Adding more RAM (Random Access Memory, often just referred to as memory) can be a game changer for your bogged down PC. There are several factors that contribute to the speed of a PC. Let’s very briefly break these …

What is your Identity Worth to You?

Brittany Pescetto Blog 0 Comments

Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let’s talk about a few of these statistics and what it means. First of all, what shocked us the most is that according to the FTC, in the United States, …

Disaster Recovery and Why it Matters to Your Business

Brittany Pescetto Blog 0 Comments

When you mention the term ‘disaster recovery,’ most people think about the big ground-shattering events like earthquakes, fires, floods, tropical storms, etc. While these natural events are certainly disasters and devastating in their own right, smaller things can constitute as a disaster for your business, and they aren’t seasonal. Let’s look at the definition of disaster. A calamitous event, especially …

Protect Your Online Identity With These 8 Tips

Brittany Pescetto Blog, Tip of The Week 0 Comments

The Internet has long been a great tool for business, but you canít take advantage of it without putting your sensitive data at risk of threats, like hackers and malware. Granted, when it comes to cyber security, even the most cautious business will have a lot on their plate. Weíll go over eight of the most important security best practices, …