top of page

Our Blog
Here we cover important news and updates on several topics, such as: data security, compliance, cloud computing, HCL product updates, our company news, and more.
Search
Be Prepared: Build Your Incident Response Plan Now
Don't Get Caught Flat-Footed: Why You Need an Incident Response Plan (Like, Yesterday) Let's face it, the digital world can be a bit of a Wild West these days. Cyberattacks are on the rise, data breaches seem to happen daily, and even a simple system outage can bring your business to a screeching halt...
Justin Hill
Apr 17, 20245 min read
2
0
Navigating the Cyber Insurance Claims Process: A Comprehensive Guide to Ensuring Your Payout
In today's interconnected world, cyber threats are a constant reality for businesses of all sizes. As a result, cyber liability insurance has become an increasingly important aspect of risk management. However, a cyber insurance policy is just a starting point; the real challenge lies in navigating the claims process effectively to ensure a successful payout...
Justin Hill
Mar 27, 20242 min read
1
0
How Effectively Managing Risk Bolsters Cyber Defenses
In today’s ever-evolving digital landscape, where cyber threats and vulnerabilities continually emerge, it’s evident that eliminating all risk is impossible. However, there is a powerful strategy that can help address your organization’s most critical security gaps – comprehensive cyber risk management. Cyber Risk Management vs. Traditional Approaches Cyber risk management differs significantly from traditional approaches...
Justin Hill
Jan 17, 20243 min read
1
0
Defining Strategic Cyber Risk Management: Achieving Resilience with NIST CSF
In today's digital age, businesses of all sizes face an ever-increasing threat landscape, making cyber risk management a critical imperative to secure sensitive data, safeguard critical technology, and ensure business continuity. The NIST Cybersecurity Framework (CSF) stands as a comprehensive guide to help businesses effectively manage cyber risk and build a robust cybersecurity posture. Defining...
Justin Hill
Jan 8, 20242 min read
1
0
The Significance of Cloud Backup for Your Business
In the rapidly evolving digital landscape, the security of your data is paramount. As the age-old saying goes, prevention is better than cure, and it couldn't be truer when it comes to data loss. Whether through hardware failures, software glitches, or natural disasters, data loss is a formidable threat that can disrupt your business, leading...
Justin Hill
Dec 17, 20233 min read
2
0
Mastering Business Impact Analysis (BIA) for Robust Resilience
In the realm of cybersecurity and disaster recovery, understanding the significance of a Business Impact Analysis (BIA) is paramount. A BIA meticulously quantifies the effects of a cyber disruption on your business, irrespective of whether it stems from an internet outage or a severe breach. This process serves as the cornerstone for a robust Business...
Justin Hill
Dec 14, 20233 min read
1
0
Strengthening Your Ransomware Defense: Best Practices for Protecting Your Business
In today's digital landscape, ransomware has emerged as one of the most pervasive and costly threats to businesses worldwide. This malicious software encrypts critical files and systems, holding them hostage until a ransom is paid to the attackers. From its humble origins as a computer virus in the late 1980s, ransomware has grown into...
Justin Hill
Dec 11, 20233 min read
2
0


Domino SSL Implementation and Renewal: A Survivor's Guide
With the industry standard limiting SSL/TLS certificates to a one year expiration date, a streamlined approach is needed now more than ever to keep your sites secure. At Collabsphere 2023, our very own Avery Shaffer did a great presentation on SSL implementation and renewal so let’s explore the key point of it. Why is SSL...
Justin Hill
Sep 21, 20235 min read
2
0
How Cybercrime Can Affect Your Company
It’s no secret that the weakest point of any company’s cyber security is its people. Making sure that everyone from the CEO to the temps and interns know how to recognize a phishing attack has been a major priority and a headache for IT security professionals. A lack of knowledge among your employees can have...
Justin Hill
Feb 13, 20231 min read
1
0
Email Encryption
Emails are now not only an important part of our daily lives but also one of the most used gateways for cybercriminals into our lives. Let’s explore how we can keep the door shut. The importance of email encryption Email encryption refers to, as the name suggests, encrypting the content of emails in order to...
Justin Hill
Jan 12, 20231 min read
3
0
Top 5 Cybersecurity Tips
Cybersecurity has been a top priority for most companies in recent years, and no wonder. The volume and the sophistication of cyber attacks has been steadily increasing year over year. What we can do to ensure that we keep our organizations safe? Let's take a look at the 5 things that have the most impact...
Justin Hill
Nov 10, 20221 min read
1
0
SMBs and Cybersecurity
Why SMBs are Prime Targets for Cyber Criminals Today You might think that only big companies can have trouble with data security and data breaches. It’s not entirely true. While the big cybersecurity scandals revolve around big corporations, SMBs are just as vulnerable if not even more. Research made by companies like Proofpoint has shown...
Justin Hill
Sep 26, 20222 min read
1
0
MFA for HCL Domino
During Collabsphere 2021 Prominic.NET presented a new option for multi-factor authentication for HCL Domino. The new tool is called MFA for HCL Domino®. It is free and open source, licensed under the Apache license and it provides both SMS and TOTP support, a fully customizable user interface, and multi-language prompts Here is a sneak peak...
Justin Hill
Nov 4, 20211 min read
8
0
How to ensure data privacy in the cloud
Keeping company data private and secure while operating in the cloud is the question that has been increasingly one of the primary concerns for organizations, especially since the pandemic has made us all work from home a lot, often with less than secure systems. What is data privacy and data security? Most articles written about...
Justin Hill
Jun 29, 20210 min read
1
0
8 Infrastructure Questions to Ask Your Hosting Provider
When evaluating companies you will entrust with hosting your data and applications, there are several infrastructure questions that have to be asked to make sure your data will be safe and sound...
Justin Hill
Oct 3, 20164 min read
1
0
bottom of page