Categories

Steps To A Successful Cloud Migration

Posted: 02/08/2018 in: Cloud, New Technology, Security

Sany businesses have jumped in head first into the cloud, only to abandon it later when it failed to live up to the hype. Despite this, the predication is that cloud adoption will grow by 5-10% again this year, driven by promises of agility, growth and cost savings. So, what are the most common problems…

Read More

Mobile Devices Stack

Mobile Safeguarding: The New Malware Prevention Practice

Mobile malware attacks skyrocketed last year. In just the first quarter of 2017, McAfee had already detected more than 1.5 million new incidents of malware specifically targeting mobile devices. By January 2018, Google had removed 60 apps from its Play Store due to malware. As their screen size, speed and performance have increased, smartphones have…

Read More

A 2018 Best Place To Work in Connecticut

For the 5th year in a row, Cooperative Systems has been named as a Best Place to Work in Connecticut! This thirteenth annual program was created by the Hartford Business Journal and Best Companies Group. “We are so pleased to be recognized by BPTW for the 5th year in a row,” Bob DeLisa, President of…

Read More

BankWorld 2018 Podcast Interview

BankWorld 2018 took place this past Friday, January 12th, at Mohegan Sun. Scott Spatz and Megan Lanouette of Cooperative Systems were invited to give insights about Cooperative Systems’ NOAH Outsourced IT, Maintenance, and Security Services for banks and credit unions. Tune in as Scott offers a high-level overview of services that Cooperative Systems offers and…

Read More

scrabble tiles resolutions

Five Signs That You’ve Been Hacked

January 28 is Data Privacy Day, and the start of this new year is the right time for implementing resolutions and fresh starts! Have you resolved to be more vigilant in 2018? Your small business cannot afford to overlook the dangers posed by hackers who are getting more sophisticated every year. But how do you…

Read More

mobile devices

Is a BYOD Policy Right for Your Business in 2018?

Posted: 12/07/2017 in: Business Planning, BYOD, Management, Mobile Devices

As 2017 winds down, it is time to forecast the workplace technology trends for 2018 and anticipate how these trends can impact your small business. One of the biggest trends is Bring Your Own Device, or BYOD. Being that we are in the business of making sure you are prepared for what the changing technology…

Read More

3 Best Practices for Safe Online Shopping

Posted: 11/20/2017 in: Consumer, Security

Online shopping opens the potential for you to be phished and scammed into losing control of your information. Here are 3 keys to successfully safe online shopping this season!

Read More

How To Test Your Business Security

There’s more to business security than putting in place a firewall and some security software and hoping it wards off attacks and other threats. To achieve this, initial and ongoing testing has to happen and the follow-through thereafter is key. Here’s how to determine if your business is really ready to combat threats and stay…

Read More

Shadow IT – The Risk Lurking in Your Company’s Devices

Do you know every web application your employees are using? There is a high probability that your workforce is utilizing many devices and applications without explicit approval. Collectively, these programs and devices are called Shadow IT. Shadow IT is essentially any application employees download or IT service they sign up for without vetting by your…

Read More

locked safe

The Equifax Breach: What You Need To Know

Posted: 09/11/2017 in: Consumer, Security

The Equifax breach that we learned about late last week affected an estimated 143 million Americans. This translates to over 40% of the population’s worth of data in our country. As of noon on Monday, September 11, 2017, the culprits have yet to be identified. The severity of the Equifax breach, in particular, is that…

Read More