Call Us (860) 577-8060

Security Archives - Sound Computers | Westbrook, CT

blog-img

How well are you keeping track of mobile devices that can access your business apps and data? If you are like many businesses out there, mobile security may be taking a backseat to IT security for servers and computers.

Read More
blog-img

An offboarding process is an important part of the employee life cycle. If it is not done correctly, company data can be at risk and hard-won corporate knowledge can be lost.

Read More
blog-img

One of the biggest cybersecurity stories in recent history is the ransomware attack on Colonial Pipeline. In fact, it is still impacting gas stations across the East and Southeast!

Read More
blog-img

There has been a troubling rise in the number of attacks that target the very operating instructions that make a device function. The firmware layer sits outside of the operating system and holds most of the control over how the hardware interacts with other software (like an operating system). 

Read More
blog-img

Putting together a robust cybersecurity strategy that keeps you fully protected is getting to be more complex all the time. Hackers are constantly coming up with new attack methods as well as organizing their efforts to make attacks more effective.

Read More
blog-img

Compromised passwords are a major cybersecurity issue regardless of the size of your business. In 2019, 80% of data breaches were due to stolen or hacked login credentials.

Read More
blog-img

2020 was not only the year of the COVID-19 outbreak. Many in the IT security world are also calling it the year of the Cyber Pandemic.

Read More
blog-img

Voice assistants and doorbell cameras are not the only devices multiplying in homes. IoT devices are as well. They are also popping up in offices throughout Connecticut and across the rest of the country.

Read More
blog-img

One of the major IT security problems at a business (regardless of size) is access security. Passwords are often the only thing keeping hackers out of everything from company cloud storage accounts to remote server access.

Read More
blog-img

Year end is when many companies are doing reviews in order to plan ahead for the new year. One area where it is vital to do this is cybersecurity.

Read More