Welcome to the AllConnected News
Your source for IT and cybersecurity news and updates, tips on improving your business IT, and guides for navigating IT capabilities and responsibilities
Now for 2020, the FTC Safeguards Rule requires every tax professional, whether you are a partner in a large firm or a sole practitioner, and every Authorized IRS e-File Provider, to create and enact security plans to protect client data.
The new IRS Form W-12: Paid Preparer Tax Identification Number (PTIN) for Application and Renewal now includes a legal requirement for data protection:
The theme for National Preparedness Month 2020 is
“Disasters Don’t Wait. Make Your Plan Today.”
The NPM goal is to ‘promote family and community disaster planning now and throughout the year’. As we continue to respond to COVID-19, there is no better time to be involved this September.
We get it: company executives don’t usually want to talk about Backup and Disaster Recovery (DR). But consider, if your company suffers a major data disaster and you don’t have a resilient DR plan, you face an over 90% chance of going out of business within one year.
At the outset, your DR runbook should provide your organization a clear plan of action for recovering from a disaster.
Make sure to include screenshots, diagrams, graphs, and/or tables to support the written documentation.
While every organization is different the DR Runbook should include:
There are many players in the data protection, backup and recovery space, many who claim to provide a “DRaaS” service, but not many provide for all aspects you should expect in a Disaster Recovery Solution.
AllConnected believes you should have the facts so you can make an informed decision.
Regardless of what business you run, your Disaster Recovery plan begins with backup.
Your employees need executive leadership whether you’re in-office, on-the-road, or working-from-home. As you adapt to the new business environment and implement effective WFH communication, consider how a comprehensive WFH solution will drive productivity and satisfaction.
From an IT Security perspective, the term “social engineering” refers to cybercriminals using any number of psychological tricks to get users to perform actions (click on an email or link) or divulge personal or confidential information.
While technical hackers seek vulnerabilities in the networks or software, social engineering cybercriminals exploit an end user’s tendency to trust…
Thanks to organizations like FIDO Alliance, authentication has become more sophisticated. Now, instead of yet another piece of information (like a pin or social security number), authentication is determined by the use of more than one factor, simply classified as “what you know”, “what you have,” or “what you are.
The most common ransomware encrypts files, folders, or entire hard drive partitions using military-grade encryption algorithms like RSA or The most common ransomware encrypts files, folders, or entire hard drive partitions using military-grade encryption
The outbreak of COVID-19 has kept most “non-essential” employees at home. So, consider the following steps to make sure your employees are both productive and secure working remotely. Our engineering team has assembled some important observations and recommendations below for your organization to ensure continuity of business operations with remote workers