• Skip to main content
  • Skip to footer

Solid State Systems LLC

Tailored IT Solutions for Modern Businesses

  • Home
  • About Us
  • Our Services
    • Cloud
    • CTO/CIO
    • Unified Communications and Collaboration
    • Infrastructure Management
    • Network Management
    • Managed Services
    • IT Security
      • Cyber Intelligence and Penetration Testing
    • Disaster Recovery
  • Blog
  • Contact Us

Blog

BYOD vs COPE: What You Need to Know Before You Choose One

BOYD vs COPE - what’s your mobile device plan for your employees?

72.3% of employees in the US will be “mobile workers” by 2020, according to the international data corporation (IDC).   This means your IT team needs to mitigate the risk of mobile devices used for work. You have 3 options: You could allow your employees to bring their own mobile devices to work, AKA “bring your own device,” or BYOD. You could supply mobile devices to your employees through a “choose your own device” plan (CYOD). Or, you could offer a “corporate owned, personally enabled” plan (COPE). Out of those 3 options, there’s only 2 that most companies have to decide between: BYOD vs COPE. That’s because CYOD doesn’t offer the personalization that comes with BYOD or COPE - something modern employees have … [Read more...] about BYOD vs COPE: What You Need to Know Before You Choose One

Filed Under: Tips and Advice Tagged With: hardware, IT planning, network, risk mitigation, security

5 Best Practices for Insider Threat Detection

Insider threat detection best practices that can save your company from an inside job

“Current employees” were the biggest cause of security incidents in 2015 - surpassing hackers, contractors, and organized crime syndicates, according to a PriceWaterhouseCoopers report. While you work to guard against outside IT security threats like ransomware, it’s easy to forget that the biggest threat to your business could be sitting in the cubicle next to your office. To prevent the “insider threat” from stealing your data, you’ll first have to find out who the insider threat is - a process known as “insider threat detection.” We’ll give you 5 tips for insider threat detection that will help you track, identify, and shut down any current employee who poses a risk to your organization. But before we do that, let’s define … [Read more...] about 5 Best Practices for Insider Threat Detection

Filed Under: Tips and Advice Tagged With: loss prevention, risk mitigation, security

Hack Back Pros and Cons: What You Need to Know Before Striking Back

Do you know when the right time is to hack back?

“The likely annual cost to the global economy from cybercrime is more than $400 billion,” according to McAfee’s report, Net Losses: Estimating the Global Cost of Cybercrime. With businesses experiencing such staggering losses worldwide, it’s no wonder some are considering ways to strike back against the cybercriminals who rob them. This is often known as “hacking back,” or a “hack back.” Currently, at least one Congressman wants to make it completely legal. Rep. Tom Graves, a Georgia Republican, has drafted a bill known as The Active Cyber Defense Certainty (ACDC) Act and it would amend the Computer Fraud and Abuse Act, which bans unauthorized access of computers. Graves said in a press release, “This bill is about … [Read more...] about Hack Back Pros and Cons: What You Need to Know Before Striking Back

Filed Under: Tips and Advice Tagged With: network, risk mitigation, security

Advanced Persistent Threat Protection: 7 Ways to Prevent APT Attacks

What is your advanced persistent threat protection plan against high level stealth attacks?

53% of IT professionals see advanced persistent threat protection as one of the top security issues facing their organization, according to Cloud Adoption Practices & Priorities Survey Report. Surprisingly, only 68% of IT managers know what an advanced persistent threat is, according to the Ponemon Institute. If you don’t know your enemy, you can’t defeat them. Advanced persistent threats are one of the most dangerous enemies attempting to infiltrate your organization. To help you prevent them from overpowering your systems and stealing your data, we’ll show you what an advanced persistent threat is, how it works, and various forms of advanced persistent threat protection you can implement today. What is an Advanced … [Read more...] about Advanced Persistent Threat Protection: 7 Ways to Prevent APT Attacks

Filed Under: Tips and Advice Tagged With: network, risk mitigation, security

How to Make Small Business Network Security Safe in 10 Tips

Protect your small business network security and know who has access to your sensitive data.

Even if you run a small business, you’re still vulnerable to cyberattacks from hackers. Companies with 250 employees or less were targeted by hackers 31% of the time in 2012, according to Symantec - which is why you need to optimize your small business network security. Without it, you could lose thousands of dollars or go out of business. To help you keep your business and your data intact, we’ll show you a few tips for maintaining a reliable and secure network. But first, let’s define network security. What is Network Security? Small business network security is the combination of hardware, software, policies, and practices used to protect a company’s network from unauthorized access. Essentially, it’s everything … [Read more...] about How to Make Small Business Network Security Safe in 10 Tips

Filed Under: Tips and Advice Tagged With: network, risk mitigation, security, software

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Interim pages omitted …
  • Go to page 7
  • Go to Next Page »

Footer

Connect with Us

  • Facebook
  • LinkedIn
  • Twitter

Copyright© 2023 Solid State Systems LLC · 244 Fifth Avenue, STE 2478, New York, NY 10001 · +1 646 783 4096 · info@solidsystemsllc.com