The High Costs of Data Security (Updated)

daat protection

Data security problems come in all shapes and sizes. Some are malicious, while others are just human error. Regardless of the nature of the problem, data leaks can be devastating to businesses. Here are some key findings from the 2018 Ponemon Institute report that show just how harmful data leaks can be. Malicious attacks are on…Read Full Article

Common IT Mistakes Small Businesses Should Avoid

small business miskate

Every company in the world depends on some form of technology to function and achieve success. This means companies, especially small companies, need to put a lot of thought into their IT-related decision. In a small business, these IT decisions can have a huge impact and it’s all too easy to make common mistakes. Being…Read Full Article

Are Security Experts Wrong About Passwords?

password security

For years now we’ve been educated on the importance of ‘strong’ passwords and what constitutes a strong password. When creating a password, you must include both letters and numbers, with at least one of those letters capitalized, to help ensure your privacy. Be sure to include a special character as well, and avoiding personally-identifiable information,…Read Full Article

How to Work Effectively from Anywhere

work remote

Whether it’s working from home when your kids are sick or working from an airport lobby on a sales trip, having the ability to work from anywhere makes life so much easier. Before you leave the desk behind, there are three things you need to do if you want to be effective working remotely. Store…Read Full Article

Network Control for Remote Access

Network Control for Remote Access

Network Access Control (NAC) has become a hot topic for a wide range of corporate stakeholders, including business leaders, networking groups, and security teams. Despite all the different NAC solutions available there is still a lot of misunderstanding about what NAC really does. Before looking at the important role of NAC, it’s important to understand what…Read Full Article

Your IT Security Checklist

checklist

When it comes to managing and securing your IT systems, it’s vital to make sure all your bases are covered. It’s easier than you think to lose track of what’s already been completed, and what still needs to be fixed. Whether you have an in-house IT staff or outsource your IT needs to a managed…Read Full Article

The Department of Redundancy Department

it

All client names have been changed due to confidentiality agreements. Large scale problems need large scale solutions. In the case of Vandelay Produce, JD Young overhauled the entire IT infrastructure of a rapidly growing company with numerous locations that must be in constant communication with each other, and we did it with the client experiencing…Read Full Article

Email Encryption Made Easy

email encryption

All client names have been changed due to confidentiality agreements. The concept of core competencies was introduced in 1990 in a Harvard Business Review article. This new management tactic preached that businesses should only focus on what they do better than anyone else. So what’s an escrow closing company to do when new cybersecurity regulations…Read Full Article

Teamwork Makes the Dream

IT team

All client names have been changed due to confidentiality agreements. While JD Young certainly has the ability to act as a company’s primary IT provider, we also have the ability to come alongside existing IT teams to supplement their efforts. This was the case with Cyberdyne Petroleum. The Client Cyberdyne Petroleum provides gasoline and diesel…Read Full Article

Why One Man Shows Don’t Cut It

IT guy

All client names have been changed due to confidentiality agreements. Using the friendly neighborhood IT guy is fine when a company is starting out. But when the friendly neighborhood IT guy sets up an open guest Wi-Fi network with access to your company’s internal network, it’s time to rethink your IT approach. The Client Acme…Read Full Article