CCS Technology Group: Blog

Disaster Data Recovery: Are You Prepared?

By Chris Higgins | Dec 19, 2021

Most businesses have now gone digital, taking their processes online and storing data in the cloud and whatnot. While speedier transactions and greater portability make this technique very convenient, it also poses some risks. One of these is the risk…

Read More
cybersecurity insurance

Cybersecurity Insurance – 5 Reasons Why you need it

By Chris Higgins | Oct 19, 2021

Cybersecurity insurance, also referred to as cyber insurance or cyber liability insurance, is insurance that your business can buy to reduce risks to data loss. A cybersecurity insurance policy will transfer some risk to the insurance company for a fee. While all types of insurance…

Read More
Cybersecurity and Internet Safety

Are Cybersecurity and Internet Safety the same?

By Chris Higgins | Oct 6, 2021

We use it, but we don’t think about it. Modern society is dependent on technology. Whether it’s your TV, the Internet, a laptop, or a phone, there’s no denying how much life has changed over the last two decades. This online access means that individuals…

Read More
true security compliance audit

True Security Doesn’t Mean Passing a Compliance Audit

By Chris Higgins | Jul 8, 2020

Keeping company IT resources secure is a critical goal. Meeting compliance standards supports that effort, but achieving compliance isn’t the same as achieving security. This usually requires going beyond the baseline measures needed for compliance.

Read More
dark web IT security strategy

Searching the Dark Web Should be Part of Your Information Security Strategy

By Chris Higgins | Jun 15, 2020

Every business is vulnerable to attack, but it isn’t always obvious that an attack was successful. Because hackers often post stolen data on the dark web, finding it there confirms that you’ve been attacked and lets you know what sensitive data was taken.

Read More
information security focuses

Two Numbers to Keep in Mind When You Think About Information Security

By Chris Higgins | Jun 8, 2020

Can you afford to lose more than eight million dollars in under a minute? No matter what your business is, it’s at risk, and protecting networks, data, servers, and other corporate IT resources need to be a priority.

Read More
remote work from home security practices

8 Practices for Safe Computing When Employees Work at Home

By Chris Higgins | May 11, 2020

Employees working from home can be casual about their dress, but they shouldn’t be casual about their computing practices. Employers can help employees work safely when they’re working remotely by teaching them to follow these 8 practices.

Read More
about network monitoring

Know What’s Happening on Your Network with Network Monitoring

By Chris Higgins | Apr 13, 2020

Information security requires knowing what’s coming into your network so you can protect the valuable data inside. Network monitoring is a vital element of both infrastructure management and information security.

Read More
phishing costs and consequences

The High Cost of Falling for Phishing

By Chris Higgins | Mar 11, 2020

Any employee can fall for a phishing scam. When the employee who falls for the scam is authorized to access and transfer large sums of money, an honest mistake can have significant costs.

Read More
backups ransomware

Don’t Let Ransomware Destroy the Backups You Need to Recover from Ransomware

By Chris Higgins | Feb 17, 2020

Backups are the primary means a business can use to recover from a ransomware attack. It’s no wonder, then, that many forms of ransomware now attempt to destroy any backup files they encounter. Protecting your backups against ransomware is an important part of your defensive strategy.

Read More