Posted by: on October 5, 2018 at 8:00 am

1983 IBM XT computer

1983 IBM XT; see attribution below.

Computer hacking and cyberattacks have been around since before War Games came out in 1983. That was 35 years ago this year. (Yes, it’s been that long. Yes, those of us on our staff who were alive back then feel old too.)

In 2003, the Department of Homeland Security was created. Among the early results were the National Cyber Security Division and National Cyber Security Awareness Month. October 2018 is the 15th anniversary of National Cyber Security Awareness Month.

(Side note: 2018 is also the 15th anniversary of TAZ Networks. Yay!)

Last year, we wrote a round-up blog post with links to 30 of our cybersecurity blog articles. Here’s the link. This year, we thought we’d highlight some of the ways that we look out for your business computer network.

Webinars and in-person training are two new things we’re doing this year to make sure you and your staff are doing what everything feasible to protect your network.

A managed firewall is one of the first lines of defense for cybersecurity, blocking unauthorized traffic from your network data and files.

Sometimes end users get annoyed when we restrict local administration rights. Having this as a set policy, however, helps protect against unscrupulous or untrained people from installing malware and other viruses.

These are just a few of the safeguards we put into place for our managed IT clients. Click here for more details about our network security protections.

So, Is It Cyber Security or Cybersecurity – One Word or Two?

The National Cyber Security Alliance seems to prefer “cyber security” as two words. The Associated Press Stylebook and Merriam-Webster both list “cybersecurity” as one word. We prefer one word as well.

When was the last time someone reviewed your company’s network security? Fill out the form at the right and we’ll be happy to take a look.

***

Image attribution: “Ibm px xt color” by Ruben de Rijcke, via Wikimedia Commons, licensed under CC BY 3.0. It has not been modified by TAZ Networks, Inc.

Schedule An Appointment






    * Required fields

    Blog Archive