Business Continuity Planning is unfortunately brought to the forefront of our minds when tragedies like Hurricane Sandy strike. Most importantly, our best wishes go out to all of the people affected by the storm. Once the immediate urgency of the disaster has subsided, the conversation...

You run best-of-breed security software in your business. Your firewall is from a top-tier vendor and hardened. You run regular penetration tests on your network to make sure your exposure is in check. You even encrypt your data and enforce strong password policies on your...

Think back ten years ago and try to remember what kind of mobile device you were carrying. Calling it a “device” may even be a stretch because, more than likely, your device was a phone that made calls and did little more. You may have...

As summer vacations come to an end, focus returns to work and school. For some parents, it is sending a child off to college, while for others with younger children, it may be starting their youngster in school for the first time. Others still may...

I can remember a recent visit to a customer location, where the business owner proudly showed me his brand new, (and expensive I might add) fireproof safe he bought to store his company’s critical data.  A quick look at it and I exclaimed “no good!” ...

As you have probably heard by now, Microsoft announced their new tablet technology, called Surface. By most accounts the hardware appears to be high quality.  The 10.6” screen has a very nice display, touch screen technology and the device has many available ports for connectivity. Rather...

It’s no secret to businesses using Microsoft’s venerable Windows XP that Microsoft will be terminating extended support for the operating system on April 8, 2014. Termination of extended support means that there will be no monthly patches for security problems, bugs, etc. In short, as...

In today’s digital age, securing your critical information – whether it be personal information or business information – is increasingly difficult. Threats are increasing both in number and in complexity and sophistication. Threats can come from individuals, groups, companies, or even governments.  In January, a...

The ubiquitous nature of mobile devices like iPhones, iPads, and Android devices among consumers has led to an interesting dilemma for IT security professionals. BYOD (Bring Your Own Device) to work has become the norm in many organizations today. Gartner has stated that, by 2014,...

There has been a lot of discussion about cloud computing in recent years and major companies like Google and Microsoft are investing millions of dollars into competing for that space. At Colden Company Inc., we are often asked about the cloud and whether or not...