<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.newfathom.com/blogs/tag/small-business/feed" rel="self" type="application/rss+xml"/><title>New Fathom IT - Blog #Small Business</title><description>New Fathom IT - Blog #Small Business</description><link>https://www.newfathom.com/blogs/tag/small-business</link><lastBuildDate>Fri, 10 Apr 2026 18:10:01 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Why Backups Alone Are Not a Ransomware Strategy]]></title><link>https://www.newfathom.com/blogs/post/why-backups-alone-are-not-a-ransomware-strategy</link><description><![CDATA[For years, the go-to answer to ransomware has been simple: “We have backups.” While backups are a critical part of any cybersecurity program, relying ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Hoi8RnuwTRiYXpo72KKKcQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_e5xJbGttTWiITuDYFknKbA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_91sid9rpT82gavQyYggfew" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_pjkyK43l9RBOW_UrTGE4_g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_pjkyK43l9RBOW_UrTGE4_g"] .zpimage-container figure img { width: 1110px ; height: 740.00px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Images/Backups%20and%20Recovery%20-%20Feb%202-%202026-%2002_57_06%20PM.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_TvmafSb_QRuq8x8ASb5B_g" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>Why Backups Alone Are Not a Ransomware Strategy</span></h2></div>
<div data-element-id="elm_ZgxHIhL6TQGPY5dJet1zqQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><div style="text-align:justify;">For years, the go-to answer to ransomware has been simple: “We have backups.” While backups are a critical part of any cybersecurity program, relying on them as the primary ransomware defense is a dangerous oversimplification. In today’s threat landscape, backups alone are no longer enough.</div><div style="text-align:justify;"><br/></div><div style="text-align:justify;">Modern ransomware attacks are no longer smash-and-grab operations. Attackers are patient, deliberate, and strategic. Once inside a network, they often spend days or weeks performing reconnaissance—identifying critical systems, locating backup infrastructure, and escalating privileges. By the time ransomware is deployed, attackers frequently know exactly where backups live and how to disable or encrypt them first.</div><div style="text-align:justify;"><br/></div><div style="text-align:justify;">From a NIST Cybersecurity Framework (CSF) perspective, this is a failure of the Protect and Detect functions. If attackers can move freely, access backup systems, and operate undetected for extended periods, the organization is already operating at a disadvantage long before encryption begins.</div><div style="text-align:justify;"><br/></div><div style="text-align:justify;">Even when backups survive an attack, recovery is rarely quick or painless. Restoring large environments can take days or weeks, during which business operations may be severely disrupted. For many organizations, especially small and mid-sized businesses, extended downtime can be just as damaging as data loss itself. Missed revenue, lost customers, regulatory penalties, and reputational harm can far outweigh the cost of the ransom.</div><div style="text-align:justify;"><br/></div><div style="text-align:justify;">This is where Incident Response (IR) and Disaster Recovery (DR) planning intersect. Backups support recovery, but without a defined incident response process—who makes decisions, how systems are isolated, when recovery begins—organizations often lose valuable time. In NIST terms, the Respond and Recover functions are just as critical as prevention.</div><div style="text-align:justify;"><br/></div><div style="text-align:justify;">Another common misconception is that any backup is a good backup. Traditional backups that are writable, online, and accessible with standard administrative credentials are prime targets. If attackers compromise a domain admin account—and many do—those backups are often compromised right along with everything else. Without protections like immutability, offline copies, or strict access controls, backups may offer a false sense of security.</div><div style="text-align:justify;"><br/></div><div style="text-align:justify;">Testing is another overlooked weakness. Many organizations assume backups will work because they always have. But backups that are never tested may be incomplete, corrupted, or unusable when they’re needed most. From a DR standpoint, an untested restore is not a plan—it’s a hope. NIST’s Recover function explicitly emphasizes the importance of validated recovery processes and continuous improvement.</div><div style="text-align:justify;"><br/></div><div style="text-align:justify;">A resilient ransomware strategy focuses on survivability, not perfection. This includes layered defenses such as endpoint detection and response (EDR), least-privilege access, network segmentation, and continuous monitoring. It also requires tabletop exercises and incident response testing so teams are prepared before a real event occurs.</div><div style="text-align:justify;"><br/></div><div style="text-align:justify;">Backups remain essential, but they should be treated as a last line of defense, not the first. Organizations should invest in immutable or offline backups, restrict access to backup systems, monitor for suspicious activity, and regularly test recovery procedures. Just as importantly, leadership must understand that cybersecurity resilience is a business issue—not just an IT responsibility.</div><div style="text-align:justify;"><br/></div><div style="text-align:justify;">In ransomware incidents, the question is no longer “Can we recover our data?” It’s “Can we continue operating?” Backups help—but only as part of a broader strategy aligned with NIST CSF, Incident Response, and Disaster Recovery best practices.</div></div><p></p></div>
</div><div data-element-id="elm_v5Tcpb75Ty6-wIxUUNu9BQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 03 Feb 2026 13:18:44 -0800</pubDate></item><item><title><![CDATA[Windows 10 End-of-Life: How to Stay Safe (and Why It’s Time to Move On)]]></title><link>https://www.newfathom.com/blogs/post/windows-10-end-of-life-how-to-stay-safe-and-why-it-s-time-to-move-on</link><description><![CDATA[Windows 10 support ends in 2025, but users can extend security updates temporarily. Still, upgrading to Windows 11 is strongly recommended for better security, features, and long-term support.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_rEb-14TuQ9WwXnMiLqYJCA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_OZGJIb_SQ8iW7GQ65kKyzQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content- " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_pWLg7hUMRJ-SrFDQwNVNag" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_zS2Cii1PTL62uXzGgzIsOA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_zS2Cii1PTL62uXzGgzIsOA"] .zpimage-container figure img { width: 1110px ; height: 739.71px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/g1033ef0c302d8baad6d26a1bac745fb07755aec4c7e76f66000a1929587c76b40d29bbfe2272d47f9e4e07242c318bedbb9ab55f6170840d6c1da537f00e4ae4_1280.jpg" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_pS7EvTLjQ1OfljjKFO08HA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-left zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Windows 10 Is Going Away</h2></div>
<div data-element-id="elm_zJhn0VTIQE2mS2xSBY-9Bg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><div style="text-align:justify;">Windows 10 is officially reaching its end-of-life on&nbsp;<strong>October 14, 2025</strong>, which means Microsoft will stop providing free security updates and support to most users. But if you're not ready—or able—to upgrade your system to Windows 11, you're not entirely out of luck. Microsoft is offering Extended Security Updates (ESUs) for Windows 10 users, giving them more time to transition. Here's how you can stay secure on Windows 10 a little longer—and why upgrading still makes sense.<br/></div><div style="text-align:justify;"><br/></div></div><p></p></div>
</div><div data-element-id="elm_aztFUy7cw6AtCq1-O6AfWQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Extended Security Updates: Your Options<br/></span></h2></div>
<div data-element-id="elm_41dB5uUMk7puhcvJ2uSpSA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p>Microsoft's Extended Security Updates program was originally designed for enterprise customers, but for Windows 10, it’s being made available to&nbsp;<strong>individual users</strong>&nbsp;as well.</p><p>You now have&nbsp;<strong>two main options</strong>&nbsp;if you want to stay on Windows 10 past its official support end date:</p><ul><li><p><strong>Free Updates Through Microsoft Accounts (With Strings Attached):&nbsp;</strong>Microsoft is offering&nbsp;<strong>free ESUs for some Windows 10 users</strong>, particularly those who log in with a&nbsp;<strong>Microsoft account</strong>&nbsp;and allow telemetry and cloud integration features like OneDrive, Edge, and Microsoft 365 integration. While this is a generous offer, it does come with privacy trade-offs and may not be suitable for users with more restrictive security requirements.</p></li></ul><ul><li><p><strong>Paid Updates ($30 per Year):&nbsp;</strong>For users who don’t want to enable Microsoft cloud features or who use Windows in a professional or disconnected environment, Microsoft is offering a more traditional&nbsp;<strong>paid ESU plan</strong>—starting at&nbsp;<strong>$30 per year per device</strong>. This provides peace of mind with minimal strings attached, ensuring you get critical security patches through at least&nbsp;<strong>October 2028</strong>.</p></li></ul></div>
</div><div data-element-id="elm_3-YLHscu3hx3u6XsK6quLg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Why Staying on Windows 10 Isn’t Ideal — But May Be Necessary If You’ve Delayed<br/></span></h2></div>
<div data-element-id="elm_cAemEsrQEmysYjw_7hi1Lw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-family:&quot;pt serif&quot;;font-size:16px;">Let’s be clear:&nbsp;<strong>Extended Security Updates for Windows 10 aren’t a long-term solution—they’re a safety net</strong>. If you’re still running Windows 10 in 2025, it likely means you've put off upgrading longer than you should have. Whether it's due to hardware limitations, budget constraints, or just procrastination, the reality is that&nbsp;<strong>this option exists to buy you a little more time</strong>, not to encourage you to keep using an outdated OS indefinitely.</span></p><div><h3><p><span style="font-family:&quot;pt serif&quot;;font-size:16px;">Here’s why some users might need to rely on ESUs:</span></p><div><span style="font-size:16px;"><div><ul><li><span style="font-family:&quot;pt serif&quot;;"><strong>You’re Stuck with Legacy Hardware:&nbsp;</strong>If your current PC doesn’t meet Windows 11’s hardware requirements—like TPM 2.0 or newer CPUs—you might not be able to upgrade without replacing your device. That’s understandable, but still something you’ll need to address soon.</span></li><li><span style="font-family:&quot;pt serif&quot;;"><strong>You Haven’t Budgeted for a Replacement:&nbsp;</strong>Organizations and individuals that didn’t plan ahead may find themselves scrambling to update systems or find room in the budget for new hardware.</span></li><li><span style="font-family:&quot;pt serif&quot;;"><strong>You Need More Time to Migrate Critical Software or Workflows:&nbsp;</strong>If you’re relying on legacy software or workflows that haven’t been tested on Windows 11, the ESU program gives you a short grace period to adapt.</span></li></ul></div><div><div><span style="font-family:&quot;pt serif&quot;;"><br/></span></div><div><span style="font-family:&quot;pt serif&quot;;">But make no mistake: <strong>continuing to use Windows 10—even with ESUs—is a compromise. </strong>You’re relying on limited updates, missing out on new features, and holding onto a platform that Microsoft is gradually leaving behind.</span></div></div><div><div><span style="font-family:&quot;pt serif&quot;;">This is your final warning window. Don’t use ESUs as an excuse to stay complacent—<strong>use them to plan your transition as soon as possible.</strong></span></div></div></span></div></h3></div></div>
</div><div data-element-id="elm_HQNv2BYu6V55nk33mO11uQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>But Let’s Be Honest: Windows 11 Is the Future<br/></span></h2></div>
<div data-element-id="elm__pz31VB6In-0BbaJz6XJ1A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>While ESUs buy you time,&nbsp;<strong>Windows 11</strong>&nbsp;is clearly where Microsoft is investing its resources. Here’s why making the move is ultimately the better long-term choice:</p><ul><li><p><strong>Ongoing Support and Updates:&nbsp;</strong>Windows 11 gets regular feature and security updates without added cost or complexity.</p></li><li><p><strong>Improved Security:&nbsp;</strong>Windows 11 requires modern hardware with built-in security features like TPM 2.0 and VBS (Virtualization-Based Security), which make it much more resilient to modern threats.</p></li><li><p><strong>Modern User Interface and Features:&nbsp;</strong>From better window snapping to native Android app support and AI integration with Copilot, Windows 11 is designed for productivity and future compatibility.</p></li></ul></div><p></p></div>
</div><div data-element-id="elm_4WKzdFlI2H8gQuIUCpAyPA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Final Thoughts<br/></span></h2></div>
<div data-element-id="elm_S9oqkb-ah9Sr0-bRxY8fHg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><div><div><div><div><div><div><p>If you're not ready to move to Windows 11 yet, Microsoft’s Extended Security Updates for Windows 10 are a valuable option—especially with the free tier now available to personal users. But ESUs are a&nbsp;<strong>short-term solution</strong>, not a permanent fix. Use the extra time wisely: assess your hardware, back up your data, and plan your move to Windows 11. The future of Windows—and your security—depends on it.</p></div></div></div></div></div></div></div><div><div><div><div style="margin-bottom:12px;"><div><div><div style="margin-right:15px;"></div></div></div></div></div></div></div></div><p></p></div>
</div><div data-element-id="elm_MMR7zkmMTtuZenzYIiXJlQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 15 Jul 2025 09:52:14 -0700</pubDate></item><item><title><![CDATA[8 Things I'm Excited About in Windows 11]]></title><link>https://www.newfathom.com/blogs/post/8-things-i-m-excited-about-in-windows-11</link><description><![CDATA[Windows 11 has brought a wave of fresh updates, improved features, and exciting tools that make daily computing more efficient and enjoyable. From better multitasking to enhanced creativity tools, Microsoft has focused on making Windows 11 more user-friendly and productive.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_cw-iolZ8Sz-R8zJs0rKbIg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_QPCHWmTOThumdHjPe9UrvA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_YQuXNkz6Qb6X9iAlp6IR-A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_bn5IgDZbUX810UGMobf4Tw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_bn5IgDZbUX810UGMobf4Tw"] .zpimage-container figure img { width: 500px ; height: 292.19px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/productivity-1995786_1280.jpg" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_VO_vpUUATlCL_D7xHWtcqA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>8 Things I'm Excited About in Windows 11<br/></span></h2></div>
<div data-element-id="elm_lTfE1VpNQf6iJujrA899RQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><div>Windows 11 has brought a wave of fresh updates, improved features, and exciting tools that make daily computing more efficient and enjoyable. From better multitasking to enhanced creativity tools, Microsoft has focused on making Windows 11 more user-friendly and productive. Here are eight things I’m excited about in Windows 11.</div></div><p></p></div>
</div><div data-element-id="elm_uuZZQdMvz5_RYQLqtfB6mw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>1. Snipping Tool</span></h3></div>
<div data-element-id="elm_GB0Zk3rPyKA611CTQ3-nVA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><div><div></div><div><p>The Snipping Tool in Windows 11 has received a major upgrade, making it more than just a simple screenshot utility.</p><h4>Why It's Helpful</h4><p>The new Snipping Tool includes video recording functionality, eliminating the need for third-party applications for basic screen recordings. Whether you need to demonstrate a process, capture gameplay, or create a tutorial, this built-in tool makes it easy.</p><p>Additionally, users can set the Snipping Tool to activate when pressing the&nbsp;<code>Print Screen</code>&nbsp;button, making it even more convenient to take screenshots.</p><h4>Recording Options for Images</h4><p>Users can now annotate, crop, and edit screenshots directly within the Snipping Tool. The enhanced functionality saves time, as there’s no need to switch between different applications.</p><h4>How to Use</h4><ol start="1"><li><p>Press&nbsp;<code>Windows + Shift + S</code>&nbsp;to open the Snipping Tool.</p></li><li><p>Select the area of the screen you want to capture.</p></li><li><p>Edit, annotate, or save your screenshot directly.</p></li><li><p>To record video, open the Snipping Tool, switch to the recording mode, select the area to record, and start capturing.</p></li></ol></div><div></div></div></div></div><p></p></div>
</div><div data-element-id="elm_Kwcg5j0gGnq0kfWwVeqOcg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>2. Clipboard History<br/></span></h3></div>
<div data-element-id="elm_jt1YUR82II7I3-uG0FaS-Q" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Clipboard history is a simple but powerful feature that makes copying and pasting more efficient.</p><h4>Why It's Helpful</h4><p>Instead of being limited to a single copied item, Clipboard History allows users to store multiple copied texts and images, making it easier to retrieve previously copied content.</p><h4>How to Turn On</h4><ol start="1"><li><p>Open&nbsp;<code>Settings &gt; System &gt; Clipboard</code>.</p></li><li><p>Toggle on&nbsp;<code>Clipboard History</code>.</p></li></ol><h4>How to Use</h4><ol start="1"><li><p>Press&nbsp;<code>Windows + V</code>&nbsp;to open the Clipboard History.</p></li><li><p>Select any previous item to paste it.</p></li></ol></div><p></p></div>
</div><div data-element-id="elm_WO626aFFaiECzSmT8Ztzqg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>3. Focus Timers<br/></span></h3></div>
<div data-element-id="elm_B1V_2GwGZyfGMiVFGTUwqg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Windows 11 introduces Focus Timers, designed to help users concentrate by minimizing distractions.</p><h4>Why It's Helpful</h4><p>With built-in timers and Do Not Disturb mode, Focus Timers encourage productivity by silencing notifications and reducing digital interruptions.</p><h4>How to Use</h4><ol start="1"><li><p>Open the&nbsp;<code>Clock</code>&nbsp;app and navigate to&nbsp;<code>Focus Sessions</code>.</p></li><li><p>Set a timer for a work session.</p></li><li><p>Integrate with Spotify or Microsoft To-Do for an enhanced focus experience.</p></li></ol></div><p></p></div>
</div><div data-element-id="elm_dcSAKn_6I3k7-9X-k1XrZA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>4. Snap Layouts<br/></span></h3></div>
<div data-element-id="elm_iigPWX6ht-mnUNXso3BdNw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Multitasking is easier with Snap Layouts, allowing users to organize open windows efficiently.</p><h4>Why It's Helpful</h4><p>Instead of manually resizing windows, Snap Layouts lets users arrange multiple apps in preset layouts with a simple hover action.</p><h4>How to Use</h4><ol start="1"><li><p>Hover over the maximize button of any window.</p></li><li><p>Choose a layout and assign windows to different sections of the screen.</p></li><li><p>Quickly switch between layouts using&nbsp;<code>Windows + Z</code>.</p></li></ol></div><p></p></div>
</div><div data-element-id="elm_dETME31bK96xvPWi4wLwag" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>5. Virtual Desktops<br/></span></h3></div>
<div data-element-id="elm_ddZ12Y4Dtmq-fZm6D22pEw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Virtual Desktops in Windows 11 provide a way to separate workspaces for better organization.</p><h4>Why It's Helpful</h4><p>Users can create separate desktops for work, personal tasks, and entertainment, reducing clutter and improving focus.</p><h4>How to Use</h4><ol start="1"><li><p>Press&nbsp;<code>Windows + Tab</code>&nbsp;to open Task View.</p></li><li><p>Click&nbsp;<code>New Desktop</code>&nbsp;to create a separate workspace.</p></li><li><p>Switch between desktops using&nbsp;<code>Windows + Ctrl + Left/Right Arrow</code>.</p></li></ol><h4>New Desktops</h4><p>Windows 11 enhances Virtual Desktops with customization options.</p><h5>Naming Desktops</h5><p>Users can name their desktops to distinguish between different workspaces, making it easier to navigate.</p><h5>Shortcuts</h5><p>Use&nbsp;<code>Windows + Ctrl + D</code>&nbsp;to create a new desktop quickly.</p></div><p></p></div>
</div><div data-element-id="elm_gGPl3Rei7AolmrUny1JnvA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>6. Sound Recorder<br/></span></h3></div>
<div data-element-id="elm_pAiwRQUtn1PkQ2f7irF7hg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Windows 11 revamps the classic Sound Recorder, making it a more useful tool for recording and managing audio.</p><h4>Why It's Helpful</h4><p>The new Sound Recorder offers a modern interface with waveform visualization, improved playback controls, and enhanced audio quality settings. It’s a great tool for recording lectures, meetings, voice notes, and more.</p><h4>How to Use</h4><ol start="1"><li><p>Open Sound Recorder from the Start Menu.</p></li><li><p>Click the record button to start capturing audio.</p></li><li><p>Stop the recording and save the file in various formats.</p></li><li><p>Use playback controls to review or edit the recording.</p></li></ol></div><p></p></div>
</div><div data-element-id="elm_DqQHGTKrckDxIHapReaqYA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>7. Visualize Battery Usage<br/></span></h3></div>
<div data-element-id="elm_tMfsGz0FvsWj5ZnM2L3bdA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Windows 11 allows users to see detailed battery usage statistics.</p><h4>Why It's Helpful</h4><p>Understanding which apps drain battery life helps in optimizing device performance and extending battery longevity.</p><h4>How to See Usage</h4><ol start="1"><li><p>Open&nbsp;<code>Settings &gt; System &gt; Power &amp; Battery</code>.</p></li><li><p>View a breakdown of battery usage by apps and system activity.</p></li></ol></div><p></p></div>
</div><div data-element-id="elm_jX2raArLMdcSvQuCaTzQhA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>8. ClipChamp Free<br/></span></h3></div>
<div data-element-id="elm_T8RXcMrCMabtdU5EfwmFMw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>ClipChamp is Microsoft’s new built-in video editor, replacing Windows Movie Maker.</p><h4>Why It's Helpful</h4><p>ClipChamp provides a free, intuitive video editing experience with professional features like trimming, transitions, and text overlays.</p><h4>Reminiscent of Windows Movie Maker</h4><p>For those who miss Windows Movie Maker, ClipChamp brings back simple yet effective video editing tools in a modern interface.</p><h4>How to Use</h4><ol start="1"><li><p>Open ClipChamp from the Start Menu.</p></li><li><p>Import media and use drag-and-drop editing.</p></li><li><p>Export the final video in different formats and resolutions.</p></li></ol></div><p></p></div>
</div><div data-element-id="elm_XVkSCKTDnx78y7aVfKienA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true">Conclusion</h3></div>
<div data-element-id="elm_KuJNErd38-AbwwKsOz-Srw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><div><div><div><div><div><div><p>Windows 11 is packed with features that enhance productivity, creativity, and usability. From improved multitasking tools like Snap Layouts to creative tools like ClipChamp, these updates make the operating system more efficient and user-friendly. With these eight features, Windows 11 is shaping up to be the best version of Windows yet.</p></div></div></div></div></div></div></div><div><div><div><div><div><div><div></div></div></div></div></div></div></div></div><p></p></div>
</div><div data-element-id="elm_ZdgSNtG0Sm-e-56gvWx4Mw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 31 Mar 2025 15:53:37 -0700</pubDate></item><item><title><![CDATA[Top Cyber Security Policies Every Organization Should Have]]></title><link>https://www.newfathom.com/blogs/post/top-cyber-security-policies-every-organization-should-have</link><description><![CDATA[In today's digital age, cybersecurity is not just a technical issue to be solved by the IT department, but a business imperative that must be solved a ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_avHthubnRSi7SPFihQ5gbA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1pQVCS6qQ7CUufYjJi3Xng" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_R9f1dOPUTseyKQeNNUXbpA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_1AO7wKkqPOwhFzIMn_Qegg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_1AO7wKkqPOwhFzIMn_Qegg"] .zpimage-container figure img { width: 500px ; height: 630.21px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/pexels-photo-7731397.jpeg" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_FPo-a8FVTDWhoaXGIb6ksA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Top Cyber Security Policies Every Organization Should Have</span></h2></div>
<div data-element-id="elm_75cJBEgUSmGU4GVv1FvHYA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><span style="color:inherit;">In today's digital age, cybersecurity is not just a technical issue to be solved by the IT department, but a business imperative that must be solved and enforced at the top. Deploying and enforcing essential IT policies will help ensure your organization is ready for the real challenges likely to face an organization. Effective cybersecurity policies serve as the foundation for a secure working environment, ensuring that all employees understand their roles and responsibilities in safeguarding the organization. Below are the top cybersecurity policies every organization should have, along with explanations of their importance.&nbsp;</span><br></p></div>
</div><div data-element-id="elm_997ZX84lfenhR5R6GpFtrA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">1. Acceptable Use Policy (AUP)&nbsp;</span></h3></div>
<div data-element-id="elm_nSdGwHek78Jn7NjSxH390A" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Why It's Important:</span></h4></div>
<div data-element-id="elm_E7SCQ7JB70ZU2nRE63FBNQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">An Acceptable Use Policy (AUP) sets clear guidelines for employees on the appropriate use of the organization's IT resources, including computers, networks, and internet access. It helps prevent misuse that could lead to security vulnerabilities or legal issues.&nbsp;</span><br></p></div>
</div><div data-element-id="elm_F08fWTPc8eCZ-4OgAY2Q0w" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Key Components:&nbsp;</span></h4></div>
<div data-element-id="elm_I7lxADQUz0Af9Zz8SF1k2g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><ul><li><span style="font-weight:bold;">Permitted and Prohibited Activities:</span> The policy should clearly define what constitutes acceptable and unacceptable use of the organization's IT resources. This includes prohibiting activities such as downloading unauthorized software, accessing inappropriate websites, or using company devices for personal gain.&nbsp;</li><li><span style="font-weight:bold;">Monitoring and Enforcement:</span> Employees should be aware that their use of IT resources may be monitored to ensure compliance with the AUP, and violations can result in disciplinary action.&nbsp;</li><li><span style="color:inherit;"><span style="font-weight:bold;">Security Protocols:</span> The AUP should reinforce the importance of adhering to security protocols, such as not disabling antivirus software or bypassing firewalls.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">BYOD (Bring Your Own Device) Guidelines:</span> If the organization allows employees to use their personal devices for work, the AUP should include specific guidelines on securing these devices and accessing corporate data.&nbsp;</span></li></ul></div><div><br></div><div>An Acceptable Use Policy helps create a secure and responsible IT environment by defining what is and isn’t allowed, reducing the risk of security breaches and legal liabilities.&nbsp;</div></div></div>
</div><div data-element-id="elm_rutN8WqG4g2k8_A8pYc1yg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">2. Asset Management Policy&nbsp;</span></h3></div>
<div data-element-id="elm_DSJcE2hBCKwNvqX81JsiZA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Why It’s Important:</span></h4></div>
<div data-element-id="elm_R5rPR-rXzN4g-sE3wjf9ZQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">An Asset Management Policy helps organizations track and manage their IT assets, including hardware, software, and data. Proper asset management ensures that all assets are accounted for, protected, and maintained, reducing the risk of security vulnerabilities and ensuring compliance with regulations.&nbsp;</span><br></p></div>
</div><div data-element-id="elm_iw6-csCjXWSaUQAbEuGrkA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Key Components:&nbsp;</span></h4></div>
<div data-element-id="elm_8fXAlcTM9NS9qecf165ABw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><ul><li><span style="font-weight:bold;">Asset Inventory: </span>The policy should require the creation and maintenance of an up-to-date inventory of all IT assets, including servers, computers, mobile devices, software licenses, and data repositories.&nbsp;</li><li><span style="color:inherit;"><span style="font-weight:bold;">Ownership and Responsibility:</span> Each asset should have an assigned owner responsible for its security, maintenance, and compliance with organizational policies.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Asset Classification: </span>Assets should be classified according to their criticality and sensitivity, with corresponding security measures applied based on their classification.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Lifecycle Management: </span>The policy should cover the entire lifecycle of an asset, from acquisition and deployment to maintenance and disposal. Secure disposal practices, such as data wiping or physical destruction, should be mandated for retiring assets.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Remote Monitoring and Management (RMM):</span> RMM tools should be deployed to monitor the health, performance, and security of all IT assets continuously. These tools enable proactive maintenance, reducing the risk of asset failures and security incidents.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Endpoint Detection and Response (EDR): </span>EDR solutions should be implemented on all endpoints to detect, investigate, and respond to potential threats in real-time. This is crucial for preventing and mitigating cyber threats at the device level.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Patch Management: </span>The policy should mandate regular patching of all software and firmware to address vulnerabilities. Automated patch management solutions should be used to ensure that updates are applied promptly across all assets, reducing the risk of exploitation.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Access Controls: </span>Implement appropriate access controls to ensure that only authorized personnel have access to specific assets, reducing the risk of unauthorized access or misuse.&nbsp;</span></li></ul></div></div></div>
</div><div data-element-id="elm_h8TiFQLSRPxSoxXOfnah2w" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">3. Business Continuity Plan (BCP)&nbsp;</span></h2></div>
<div data-element-id="elm_60kYCuTuQbMNh5z-MQUvRg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Why It's Important:</span></h4></div>
<div data-element-id="elm_z66CH_ndSN_D8SVgYRMEng" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">No matter how robust an organization's cybersecurity defenses are, the possibility of a successful cyberattack or catastrophic event cannot be completely eliminated. A Disaster Recovery Plan (DRP) or Business Continuity Plan (BCP) ensures that the organization can quickly recover and resume operations in the event of a disaster, whether it's a cyberattack, natural disaster, or other significant disruption.&nbsp;</span><br></p></div>
</div><div data-element-id="elm_YC7A6xmJJ2X2K7wVVufAhA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Key Components:</span></h4></div>
<div data-element-id="elm_K-pJnDaGmHNuK-O8LGFAbA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><ul><li><span style="font-weight:bold;">Risk Assessment:</span> The plan should begin with an assessment of the risks that could potentially disrupt the organization, including cyber threats, natural disasters, and hardware failures.&nbsp;</li><li><span style="color:inherit;"><span style="font-weight:bold;">Data Backup Procedures:</span> Regular backups of critical data should be maintained and stored securely, preferably offsite or in the cloud, to ensure data can be restored if lost.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs):</span> The plan should define the maximum acceptable downtime (RTO) and the maximum amount of data loss (RPO) the organization can tolerate.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Roles and Responsibilities: </span>Clear roles and responsibilities should be assigned to ensure that the recovery process is efficient and coordinated.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Testing and Updates:</span> The plan should be regularly tested and updated to ensure its effectiveness in a real-world scenario.&nbsp;</span></li></ul></div><div><span style="color:inherit;">A well-developed DRP or BCP minimizes downtime and data loss, ensuring that the organization can quickly recover from unexpected events and maintain business continuity.&nbsp;</span><br></div></div></div>
</div><div data-element-id="elm_esobnbA2YH3OgxfwjK7OlQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p>You can edit text on your website by double clicking on a text box on your website. Alternatively, when you select a text box a settings menu will appear. your website by double clicking on a text box on your website. Alternatively, when you select a text box</p></div>
</div><div data-element-id="elm_SOBtYUFYqX_0n-ACWmwJCQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">4. Data Retention Policy&nbsp;</span></h2></div>
<div data-element-id="elm_5f4JEwPhPmwecIlpw1gGWw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Why It's Important:&nbsp;</span></h4></div>
<div data-element-id="elm_B2upPZV1ZAsjQT_vbE76Mw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">A Data Retention Policy outlines how long different types of data should be kept and when they should be securely deleted. This policy is crucial for ensuring compliance with legal requirements, reducing storage costs, and minimizing the risk of data breaches involving outdated or unnecessary data.&nbsp;</span><br></p></div>
</div><div data-element-id="elm_x_gIdczbJpZcEC-dpi5xtQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Key Components:&nbsp;</span></h4></div>
<div data-element-id="elm_xT0ovISiXtZRMqSaXBRzCA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><ul><li><span style="font-weight:bold;">Classification of Data:</span> Different types of data should be classified according to their importance and sensitivity. For example, financial records may need to be kept longer than marketing data.&nbsp;</li><li><span style="color:inherit;"><span style="font-weight:bold;">Retention Periods: </span>The policy should specify retention periods for each type of data, based on legal, regulatory, and business requirements.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Secure Deletion:</span> When data is no longer needed, it should be securely deleted to prevent unauthorized access. This may involve overwriting data or physically destroying storage media.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Compliance Considerations:</span> The policy should ensure that data retention practices comply with relevant laws and regulations, such as GDPR or HIPAA.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Regular Review:</span> The policy should be regularly reviewed and updated to reflect changes in legal requirements, technology, and business needs.&nbsp;</span></li></ul><div><br></div></div><div><span style="color:inherit;">A Data Retention Policy helps organizations manage their data effectively, ensuring that they retain only what is necessary while reducing the risk of data breaches and non-compliance penalties.&nbsp;</span><br></div></div></div>
</div><div data-element-id="elm_1I4mICseX4yMKVKg0AbgGQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">5. Password Construction Policy</span></h2></div>
<div data-element-id="elm_cUXFh1qVtKGCuohtV7iPFg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Why It's Important:</span></h4></div>
<div data-element-id="elm_asKMIs-VKNxYD4PQ618dfw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Passwords are the first line of defense against unauthorized access to an organization's systems and data. A weak password can be easily guessed or cracked by cybercriminals, granting them access to sensitive information. A Password Construction Policy ensures that all employees create strong, complex passwords that are difficult to break.</span><br></p></div>
</div><div data-element-id="elm_FRaAtLpIugHe50k371CnFg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Key Components:</span></h4></div>
<div data-element-id="elm_JRPLEuByMryPVqtuzYY2cw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div><ul><li><span style="font-weight:bold;">Length Requirements: </span>The policy should mandate the use long passwords. Longer is better and more important for password cracking than complexity! NIST does not recommend complexity be a requirement but recommends length as a key factor of a good password. Consider a length of 16 or more characters where possible.</li><li><span style="font-weight:bold;">Prohibition of Common Passwords:</span> To avoid the use of easily guessable passwords, the policy should disallow commonly used passwords like &quot;password123 Length &quot; or &quot;admin.&quot;</li><li><span style="font-weight:bold;">Unique Passwords:</span> Employees should not reuse passwords across different accounts or systems to minimize the potential impact of a single password breach. To do this effectively you probably need to deploy a password manager, but the reason for that is uniqueness.&nbsp;</li></ul></div><div><span style="color:inherit;">A strong Password Construction Policy ensures that all employees create robust passwords, significantly reducing the risk of unauthorized access.</span></div></div></div></div>
</div><div data-element-id="elm_rJUq2JazI-1VlTF1xwpS0g" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">6. Password Protection Policy</span></h2></div>
<div data-element-id="elm_znKqlRLf17smJ_R8_HIQyw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Why It's Important:</span></h4></div>
<div data-element-id="elm_YIQ4d19goHT5RTTvdhgg4A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Even the strongest password is vulnerable if it is not properly protected. A Password Protection Policy outlines how employees should handle and store their passwords to prevent unauthorized access.</span><br></p></div>
</div><div data-element-id="elm_n4T3lsevXv3DimWldyKuAA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Key Components:</span></h4></div>
<div data-element-id="elm_uwEZCUptO1798_EsnhhJNA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><ul><li><span style="font-weight:bold;">Secure Storage: </span>Employees should store passwords using a secure method, such as a password manager, rather than writing them down or saving them in an unencrypted file.</li><li><span style="font-weight:bold;">Avoiding Sharing:</span> The policy should strictly prohibit the sharing of passwords with colleagues or third parties. Each employee should have their own unique credentials.</li><li><span style="font-weight:bold;">Multi-Factor Authentication (MFA):</span> Implementing MFA adds an additional layer of security by requiring users to provide two or more verification factors, reducing the likelihood of a breach even if a password is compromised.</li><li><span style="font-weight:bold;">Suspicious Activity Reporting:</span> Employees should be trained to recognize and report any suspicious activity related to their accounts, such as unexpected login attempts or changes in settings.</li></ul></div><div>A Password Protection Policy ensures that passwords, the keys to accessing critical systems and data, are safeguarded against compromise.</div></div></div>
</div><div data-element-id="elm_11vvGafZSV6FAcdeXnB4sA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Conclusion</h2></div>
<div data-element-id="elm_9R1WNL_aTl9eH9496zLfJg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">In the face of ever-evolving cyber threats, having comprehensive cybersecurity policies is essential for protecting an organization's assets, data, and reputation. A Password Construction Policy and Password Protection Policy work hand in hand to ensure that passwords are both strong and securely managed. An Asset Management Policy ensures that all IT assets are properly tracked, managed, and secured throughout their lifecycle. A Disaster Recovery Plan or Business Continuity Plan prepares the organization for the worst-case scenario, ensuring a swift recovery. An Acceptable Use Policy establishes clear guidelines for the responsible use of IT resources, while a Data Retention Policy ensures that data is managed and disposed of securely and in compliance with legal requirements. By implementing these top cybersecurity policies, organizations can build a strong defense against cyber threats and create a secure environment for their operations.</span><br></p></div>
</div><div data-element-id="elm_jtLVi5Y_S72oNUp5rZyQdA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 04 Oct 2024 16:23:07 -0700</pubDate></item><item><title><![CDATA[Modern Data Security: Beyond Castle Walls]]></title><link>https://www.newfathom.com/blogs/post/Modern-Data-Security-Beyond-Castle-Walls</link><description><![CDATA[ In the ever-evolving landscape of data security, the analogy of fortresses and moats, reminiscent of medieva ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_45HarH1VR26wAHHuQkcFfw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_sc2OKxneRN65NLgl_dFgWw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_zts8Hx1XSpiMv3bv71DYLw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_zts8Hx1XSpiMv3bv71DYLw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_jBEiumojvZSo2lVaFDSGPw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_jBEiumojvZSo2lVaFDSGPw"] .zpimage-container figure img { width: 500px ; height: 544.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_jBEiumojvZSo2lVaFDSGPw"] .zpimage-container figure img { width:500px ; height:544.00px ; } } @media (max-width: 767px) { [data-element-id="elm_jBEiumojvZSo2lVaFDSGPw"] .zpimage-container figure img { width:500px ; height:544.00px ; } } [data-element-id="elm_jBEiumojvZSo2lVaFDSGPw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/photo-1634565055864-06ac02738f15" width="500" height="544.00" loading="lazy" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_qPz08vIAQ5yAf4G3Pz487A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qPz08vIAQ5yAf4G3Pz487A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">In the ever-evolving landscape of data security, the analogy of fortresses and moats, reminiscent of medieval times, has been a longstanding one. Traditionally, building a strong boundary around one's castle, akin to erecting firewalls and encryption protocols around data, was deemed the pinnacle of protection. However, as technology progresses and threats become more sophisticated, this old-school method of defense is proving insufficient in the face of modern cyber threats. In this blog, we delve into the shortcomings of the castle-and-moat approach and explore how modern data security strategies have evolved to address these challenges.</p></div>
</div></div></div><div data-element-id="elm_7_27yKbY9Ce8RYxzbpCkTg" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_7_27yKbY9Ce8RYxzbpCkTg"] .zpimageheadingtext-container figure img { width: 200px ; height: 157.20px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_7_27yKbY9Ce8RYxzbpCkTg"] .zpimageheadingtext-container figure img { width:200px ; height:157.20px ; } } @media (max-width: 767px) { [data-element-id="elm_7_27yKbY9Ce8RYxzbpCkTg"] .zpimageheadingtext-container figure img { width:200px ; height:157.20px ; } } [data-element-id="elm_7_27yKbY9Ce8RYxzbpCkTg"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/photo-1552775838-b0c8d3b881fb" data-src="/images/photo-1552775838-b0c8d3b881fb" width="200" height="157.20" loading="lazy" size="small" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>Perimeter-based Security: A False Sense of Safety</strong></span><br></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;"><span style="font-size:16px;">The castle-and-moat strategy relies heavily on perimeter-based security measures. Just as a medieval castle was fortified with thick walls and a surrounding moat to repel invaders, organizations would deploy firewalls and intrusion detection systems to guard their network perimeters. However, this approach operates under the assumption that threats will always come from outside the fortified boundary. In today's interconnected world, where employees access sensitive data remotely and cloud services blur the lines of traditional network perimeters, this assumption no longer holds true.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_3BLYgPttiborGTbAUnyOzw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_3BLYgPttiborGTbAUnyOzw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><h3 style="font-size:24px;"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>Vulnerabilities Within: The Trojan Horse of Data Breaches</strong></span><br></h3></div></h3></div>
<div data-element-id="elm_7Phq7q5Lz8AyylRv9tdAcA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7Phq7q5Lz8AyylRv9tdAcA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">One of the fundamental flaws of the castle-and-moat model is its failure to address insider threats. While medieval fortresses were designed to withstand external assaults, they were often infiltrated by spies or traitors who bypassed the defenses from within. Similarly, in the realm of data security, the greatest threats often come from within an organization. Whether through malicious insiders or unwitting employees falling victim to social engineering tactics, the castle walls do little to protect against these internal vulnerabilities.</p></div>
</div></div></div><div data-element-id="elm_Z2tdMvKYbzlXDwYtsz8tWw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Z2tdMvKYbzlXDwYtsz8tWw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>Dynamic Threat Landscape: Adapting to the Changing Tides</strong></span><br></h2></div>
<div data-element-id="elm_G1_7ygMvb4GWtN4c1TS3qQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_G1_7ygMvb4GWtN4c1TS3qQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">In the digital age, cyber threats are constantly evolving, rendering static defenses ineffective. A medieval castle may have stood firm against conventional siege tactics, but it would have been defenseless against modern weaponry. Likewise, relying solely on static security measures such as firewalls and antivirus software leaves organizations vulnerable to sophisticated cyberattacks like zero-day exploits and advanced persistent threats. To combat these dynamic threats, modern data security strategies emphasize continuous monitoring, threat intelligence, and adaptive defenses that can quickly respond to emerging threats.</p></div>
</div></div></div><div data-element-id="elm_yV_cfFVBUhCG24EGDZrJxQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_yV_cfFVBUhCG24EGDZrJxQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>Data Accessibility vs. Fortified Isolation: Balancing Security and Usability</strong></span><br></h2></div>
<div data-element-id="elm_0tki2vy7dkTRB7_VpdN0_A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_0tki2vy7dkTRB7_VpdN0_A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">Another drawback of the castle-and-moat approach is its inherent trade-off between security and usability. Just as a medieval castle's thick walls and narrow drawbridges restricted movement in and out of the fortress, strict security measures can hinder productivity and collaboration within an organization because you need to be physically inside. In today's fast-paced business environment, where agility and accessibility are paramount, rigid security protocols can impede innovation and inhibit digital transformation efforts. Modern data security aims to strike a balance between protecting sensitive information and enabling seamless access for authorized users.</p></div>
</div></div></div><div data-element-id="elm_NzfrqV_1kCUr3Tbc5oRhwg" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_NzfrqV_1kCUr3Tbc5oRhwg"] .zpimageheadingtext-container figure img { width: 500px ; height: 281.19px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_NzfrqV_1kCUr3Tbc5oRhwg"] .zpimageheadingtext-container figure img { width:500px ; height:281.19px ; } } @media (max-width: 767px) { [data-element-id="elm_NzfrqV_1kCUr3Tbc5oRhwg"] .zpimageheadingtext-container figure img { width:500px ; height:281.19px ; } } [data-element-id="elm_NzfrqV_1kCUr3Tbc5oRhwg"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/risk-management-and-mitigation-to-reduce-exposure-for-financial-investment-projects.webp" data-src="/images/risk-management-and-mitigation-to-reduce-exposure-for-financial-investment-projects.webp" width="500" height="281.19" loading="lazy" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>The Perils of Compliance: Meeting Regulatory Standards vs. True Security</strong></span><br></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;"><span style="font-size:16px;">For many organizations, compliance with regulatory standards such as GDPR, HIPAA, and PCI DSS is a top priority. However, the castle-and-moat approach often leads to a checkbox mentality, where organizations focus on meeting minimum compliance requirements without truly addressing underlying security risks. Just as a castle's defenses could be breached despite meeting regulatory standards, compliance alone does not guarantee protection against sophisticated cyber threats. Modern data security strategies emphasize a risk-based approach, focusing on identifying and mitigating actual security vulnerabilities rather than simply checking boxes on a compliance checklist.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_wy9ncKC9LfQJrn1Uqm2d0Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_wy9ncKC9LfQJrn1Uqm2d0Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>Embracing a Zero Trust Mindset: Redefining Security for the Digital Age</strong></span><br></h2></div>
<div data-element-id="elm_-JYU9WHlx1D5N4w-a60U1g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-JYU9WHlx1D5N4w-a60U1g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">In response to the limitations of the castle-and-moat model, a paradigm shift is underway in the field of data security. Known as Zero Trust Security, this approach challenges the notion of implicit trust within traditional network perimeters and adopts a &quot;never trust, always verify&quot; mindset. Zero Trust Security assumes that threats may already exist within the network and requires continuous authentication and authorization for every user and device attempting to access resources. By removing the assumption of trust and implementing granular access controls, organizations can better protect their data assets in today's dynamic threat landscape. This doesn’t have to be overly burdensome as companies have created easy biometric authentication and passwordless sign in. These strategies can also protect information at the data level wherever that data goes, whether at a coffee shop in Italy or a ski resort in Bend, whether on a sophisticated server or on a mobile phone in your pocket.&nbsp;</p></div>
</div></div></div><div data-element-id="elm_8EBeo4coCD380KmdUrloaQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_8EBeo4coCD380KmdUrloaQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p><strong><span style="font-size:20px;font-family:Lato, sans-serif;">Conclusion: Building Stronger Defenses for a Digital Future</span></strong></p></div></h2></div>
<div data-element-id="elm_DhmiqJCl8cgFgCUkqqx6OA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_DhmiqJCl8cgFgCUkqqx6OA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">While the castle-and-moat analogy served as a useful metaphor for data security in the past, it is no longer sufficient to protect against modern cyber threats. As technology evolves and the threat landscape continues to expand, organizations must adapt their security strategies accordingly. By embracing a holistic approach that goes beyond perimeter-based defenses, prioritizes insider threat detection, adapts to dynamic threats, balances security with usability, moves beyond compliance, and embraces a Zero Trust mindset, organizations can build stronger defenses for a digital future. Just as medieval fortresses evolved in response to changing warfare tactics, so too must our approach to data security evolve to meet the challenges of the 21st century.</p></div>
</div></div></div><div data-element-id="elm__evwMs0NQbGC4aIFrm9GWg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 09 May 2024 16:52:11 -0700</pubDate></item><item><title><![CDATA[The Cost of a Cheap (Slow) Computer]]></title><link>https://www.newfathom.com/blogs/post/the-cost-of-a-cheap-slow-computer</link><description><![CDATA[Is it worth it to buy a better computer? It's time that business owners start thinking about the costs per hour of their employees and the cost of slo ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_anqdCmJ1QAKXxzQopdwqZA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_TqUekVlJSm6G5Yh8Yh-u1A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_k9-1zEQDQbi114udcFTh-A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Qtctv4Acrueb9TGr4-CmXg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_Qtctv4Acrueb9TGr4-CmXg"] .zpimage-container figure img { width: 509px !important ; height: 339px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_Qtctv4Acrueb9TGr4-CmXg"] .zpimage-container figure img { width:509px ; height:339px ; } } @media (max-width: 767px) { [data-element-id="elm_Qtctv4Acrueb9TGr4-CmXg"] .zpimage-container figure img { width:509px ; height:339px ; } } [data-element-id="elm_Qtctv4Acrueb9TGr4-CmXg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/wasting-money.webp" width="509" height="339" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_R04eBF6FQTOmXry91jginA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_R04eBF6FQTOmXry91jginA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><h1 style="margin-bottom:15px;font-size:28px;">The Cost of a Cheap (Slow) Computer</h1></div></h2></div>
<div data-element-id="elm_6iXwLqWuRXCJJKusIerkXw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6iXwLqWuRXCJJKusIerkXw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;">Is it worth it to buy a better computer? It's time that business owners start thinking about the costs per hour of their employees and the cost of slow computers in their workplace. Many business owners don't realize the financial impacts they're creating simply by buying cheap tools (computers) for their workers. Most of them wouldn't dream of sending a wood cutter with a dull chainsaw blade, but they equip their entire team with crappy computers they are stuck using every day!&nbsp;</p><p style="text-align:left;"><br></p><p style="text-align:left;">For the below example, I'm going to assume we're buying workstations for a business for workers who use it for their main job function and they work 50 weeks per year. If that's not the case, you may still be able to learn something but you'll need to adapt the math to your situation. We're also assuming that computer will last 3-5 years, but the older they get the more likely they are to be slow and the slower they will become. Also, the cheaper computers will likely have a smaller lifespan.&nbsp;</p></div>
</div><div data-element-id="elm_BzaZwIk0qNWgc3aXsGPOBw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_BzaZwIk0qNWgc3aXsGPOBw"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">What Does It Cost If It's Slow?</h4></div>
<div data-element-id="elm_QIakIi_TfCle6jvdrb_yiA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_QIakIi_TfCle6jvdrb_yiA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Having a slow computer has a two main cost centers: time and frustration. If you're using a computer that's constantly slow to open tabs or programs then not only do you lost valuable time from your day, but it's also a frustrating experience especially the busier you get.&nbsp;</p></div>
</div><div data-element-id="elm_lcrCbv7C6L-vzmG1hElTzw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_lcrCbv7C6L-vzmG1hElTzw"].zpelem-heading { border-radius:1px; } </style><h6
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Financial Cost</h6></div>
<div data-element-id="elm_zS4F7uZo3WRBvo06MTtdHw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zS4F7uZo3WRBvo06MTtdHw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Let's say you decide to buy a cheaper computer and save $500 because you buy an I3 instead of an I5 and 8GB of RAM instead of 16GB and you get an HDD instead of a solid state drive (SSD). All of those upgrades could easily cost you a three minutes of slowness throughout the day. If this computer is for an employee that costs you $25/hour then you are wasting $1.25 per day ((3/60) x $25), that may not seem like a lot, but every year that will cost $312 and over the lifetime of the computer (5 years) you'll pay $1,562 for 3 minutes every day. That's the best case scenario.&nbsp;</p><p><br></p><p>Let's say in a few years the computer is running REALLY slow and takes 30 minutes out of every day because of the lag in opening programs or slow restart times. That will cost you $12.50 per day and $3,125 every year you run a slow computer like that.&nbsp;</p></div></div>
</div><div data-element-id="elm_8SZDrJG_CovyRpxt63vlcA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_8SZDrJG_CovyRpxt63vlcA"].zpelem-heading { border-radius:1px; } </style><h6
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Morale Cost</h6></div>
<div data-element-id="elm_62SV83c5-K0G_l0JZvctGQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_62SV83c5-K0G_l0JZvctGQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>But there's more than just the financial cost. When you have employees working for you and you don't provide good tools to do their work that is a big hit to morale and will likely lead to higher turnover and less employee satisfaction. The cost of hiring and training a single employee is easily thousands and thousands of dollars. But let's say they don't quite and just spend their days complaining. Even that will have a negative impact on the business and every person that employee interacts with (I hope they're not doing customer service).&nbsp;</p></div>
</div><div data-element-id="elm_ugdOt8ZEthVPBrtrkgvm0Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ugdOt8ZEthVPBrtrkgvm0Q"].zpelem-heading { border-radius:1px; } </style><h6
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">A Nerdy Table</h6></div>
<div data-element-id="elm_v4Y4q7FDyh735cOgZsd8AQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_v4Y4q7FDyh735cOgZsd8AQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Below is a table calculating the costs per minute of slowness in your employees day. Of course, this assumes that this is time that could have been used on productive work, but it really doesn't take long to have slow computers costing you a lot of money!</p></div>
</div><div data-element-id="elm_Xp0_14HDDkqRT4ONofmjMA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Xp0_14HDDkqRT4ONofmjMA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><span style="font-size:20px;"></span><table border="0" cellpadding="0" cellspacing="0" width="335"><colgroup><col width="35" span="2" style="width:26pt;"><col width="51" style="width:38pt;"><col width="69" span="2" style="width:52pt;"><col width="76" style="width:57pt;"></colgroup><tbody><tr height="147"><td align="right" style="width:26pt;"><span style="font-weight:400;font-size:20px;">Slowness Minutes Per Day</span></td><td align="right" class="zp-selected-cell"><span style="font-weight:400;font-size:20px;">Hourly Rate</span></td><td align="right"><span style="font-weight:400;font-size:20px;">Cost/Day</span></td><td align="right"><span style="font-weight:400;font-size:20px;">Cost/Year (50 Weeks of Work)</span></td><td align="right"><span style="font-weight:400;font-size:20px;">Cost/3 Years</span></td><td align="right"><span style="font-weight:400;font-size:20px;">Cost/5 Years</span></td></tr><tr height="20"><td align="right" style="font-size:11pt;">1</td><td align="right" style="font-size:11pt;">$25 </td><td align="right" style="font-size:11pt;">$0.42 </td><td align="right" style="font-size:11pt;">$104.17 </td><td align="right" style="font-size:11pt;">$312.50 </td><td align="right" style="font-size:11pt;">$520.83 </td></tr><tr height="20"><td align="right" style="font-size:11pt;">2</td><td align="right" style="font-size:11pt;">$25 </td><td align="right" style="font-size:11pt;">$0.83 </td><td align="right" style="font-size:11pt;">$208.33 </td><td align="right" style="font-size:11pt;">$625.00 </td><td align="right" style="font-size:11pt;">$1,041.67 </td></tr><tr height="20"><td align="right" style="font-size:11pt;">3</td><td align="right" style="font-size:11pt;">$25 </td><td align="right" style="font-size:11pt;">$1.25 </td><td align="right" style="font-size:11pt;">$312.50 </td><td align="right" style="font-size:11pt;">$937.50 </td><td align="right" style="font-size:11pt;">$1,562.50 </td></tr><tr height="20"><td align="right" style="font-size:11pt;">4</td><td align="right" style="font-size:11pt;">$25 </td><td align="right" style="font-size:11pt;">$1.67 </td><td align="right" style="font-size:11pt;">$416.67 </td><td align="right" style="font-size:11pt;">$1,250.00 </td><td align="right" style="font-size:11pt;">$2,083.33 </td></tr><tr height="20"><td align="right" style="font-size:11pt;">5</td><td align="right" style="font-size:11pt;">$25 </td><td align="right" style="font-size:11pt;">$2.08 </td><td align="right" style="font-size:11pt;">$520.83 </td><td align="right" style="font-size:11pt;">$1,562.50 </td><td align="right" style="font-size:11pt;">$2,604.17 </td></tr><tr height="20"><td align="right" style="font-size:11pt;">10</td><td align="right" style="font-size:11pt;">$25 </td><td align="right" style="font-size:11pt;">$4.17 </td><td align="right" style="font-size:11pt;">$1,041.67 </td><td align="right" style="font-size:11pt;">$3,125.00 </td><td align="right" style="font-size:11pt;">$5,208.33 </td></tr><tr height="20"><td align="right" style="font-size:11pt;">15</td><td align="right" style="font-size:11pt;">$25 </td><td align="right" style="font-size:11pt;">$6.25 </td><td align="right" style="font-size:11pt;">$1,562.50 </td><td align="right" style="font-size:11pt;">$4,687.50 </td><td align="right" style="font-size:11pt;">$7,812.50 </td></tr><tr height="20"><td align="right" style="font-size:11pt;">20</td><td align="right" style="font-size:11pt;">$25 </td><td align="right" style="font-size:11pt;">$8.33 </td><td align="right" style="font-size:11pt;">$2,083.33 </td><td align="right" style="font-size:11pt;">$6,250.00 </td><td align="right" style="font-size:11pt;">$10,416.67 </td></tr><tr height="20"><td align="right" style="font-size:11pt;">25</td><td align="right" style="font-size:11pt;">$25 </td><td align="right" style="font-size:11pt;">$10.42 </td><td align="right" style="font-size:11pt;">$2,604.17 </td><td align="right" style="font-size:11pt;">$7,812.50 </td><td align="right" style="font-size:11pt;">$13,020.83 </td></tr><tr height="20"><td align="right" style="font-size:11pt;">30</td><td align="right" style="font-size:11pt;">$25 </td><td align="right" style="font-size:11pt;">$12.50 </td><td align="right" style="font-size:11pt;">$3,125.00 </td><td align="right" style="font-size:11pt;">$9,375.00 </td><td align="right" style="font-size:11pt;">$15,625.00&nbsp; &nbsp;</td></tr></tbody></table></div></div>
</div><div data-element-id="elm_-28HNss2v7Rau1zdQhvbtg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_-28HNss2v7Rau1zdQhvbtg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">What Should I Buy?</h2></div>
<div data-element-id="elm_Nu9y6MjYunzQk52ha7ARhQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Nu9y6MjYunzQk52ha7ARhQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>So what should you buy? At the least, check out our <a href="https://support.newfathom.com/portal/en/kb/articles/workstation-standards" title="Workstation Specification Standards" target="_blank" rel="" style="text-decoration-line:underline;">Workstation Specification Standards</a> and buy in the Standard User column, but if you have some heavy hitters who are very expensive per hour, consider bumping it up! If you have users that are doing billable work for you, then add that into your calculation as well. If you're using a program that requires lots of graphics capabilities, consider upgrading to a dedicated graphics card.&nbsp;</p><p><br></p><p>As a rule, stay away from the following:</p><p>- Pentium, Core Duo, I3, or Ryzen 3 processors. These are garbage for the most part. I wouldn't even want to check email with these.&nbsp;</p><p>- HDDs. They just aren't worth it... ever.</p><p>- Refurbished computers. Yes you can save some money up front, but you're likely to run into issues later. Especially don't buy these if you pay for your IT support because that will get costly really quick.&nbsp;</p><p>- Any computer that is under $500, it's almost always garbage.</p></div>
</div><div data-element-id="elm_mMDGEDcmSP-n0_t5gPDrhQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 10 Jan 2024 22:33:56 -0800</pubDate></item><item><title><![CDATA[What can happen when you click a link?]]></title><link>https://www.newfathom.com/blogs/post/what-can-happen-when-you-click-a-link</link><description><![CDATA[Bad actor gets the indication that your email works Most links sent in an email will be unique to the email it's sent to. If you click the link the bad ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm__mbvJZ70SYqBoMho7KvVIA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_pOYGXCy-SiurY7oufqy25w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_75Wrw7fxTWS4zlmYWGQcjg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_75Wrw7fxTWS4zlmYWGQcjg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_UlWTYiPqSaSQIrl7T3z0AA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_UlWTYiPqSaSQIrl7T3z0AA"] .zpimage-container figure img { width: 507px !important ; height: 338px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_UlWTYiPqSaSQIrl7T3z0AA"] .zpimage-container figure img { width:507px ; height:338px ; } } @media (max-width: 767px) { [data-element-id="elm_UlWTYiPqSaSQIrl7T3z0AA"] .zpimage-container figure img { width:507px ; height:338px ; } } [data-element-id="elm_UlWTYiPqSaSQIrl7T3z0AA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/browsing-the-web.webp" width="507" height="338" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_cuKShAnZQ_qpsboN8ZSlqw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_cuKShAnZQ_qpsboN8ZSlqw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div>What are the things that can happen when you click a link in a malicious email?</div></div></h2></div>
<div data-element-id="elm_WTjwVccrpn8TqCAttkUlhQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_WTjwVccrpn8TqCAttkUlhQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-size:16px;">Stage 1 (Just by clicking the link)</span></div></div></h2></div>
<div data-element-id="elm_3UY5cMfmTc6kuKK2edsiQA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3UY5cMfmTc6kuKK2edsiQA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><ol><li style="text-align:left;">Bad actor gets the indication that your email works</li><ol><li style="text-align:left;">Most links sent in an email will be unique to the email it's sent to. If you click the link the bad actor will know that your email address is up and working. Also, they'll know that you are the type of person that clicks links so they'll probably send you more spam!</li></ol><li style="text-align:left;">Bad actor gets your browser &quot;fingerprint&quot;</li><ol><li style="text-align:left;">Your browser session (and every browser session being used) has a footprint based on the information that's available from your session on that website. There are over 50 different data points that your browser gives to a web page just by visiting it. This information (although some is trivial) can disclose information about you and your company. So just clicking a link is giving bad actors 50 clues about you and your company. Here's a few of the things that can be part of your fingerprint: Public IP address, browser used, operating system (e.g. Windows, Mac), browser language, time zone, extensions, and much more! You can go to <a href="https://amiunique.org/fingerprint" title="https://amiunique.org/fingerprint" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">https://amiunique.org/fingerprint</a> to see how unique your browser session is (the more unique the worse off you are, don't be snowflake!).<br></li></ol><li style="text-align:left;">Everything and anything</li><ol><li style="text-align:left;">It's also possible if your browser is not updated that bad guys could use a vulnerability in your browser to do lots more than just gather information. Here's a list of the vulnerabilities that Chrome has had: <a href="https://www.cvedetails.com/vulnerability-list/vendor_id-1224/product_id-15031/opec-1/Google-Chrome.html" title="Reference " target="_blank" rel="nofollow noreferrer noopener"><span style="text-decoration-line:underline;">Reference</span></a>. Some of these allow for someone to own your browser completely. But don't worry, Chrome does a great job of updating, but if you're using an outdated browser or turned off automatic updates you could be in trouble.<br></li></ol><li style="text-align:left;">Downloading a file</li><ol><li style="text-align:left;">Sometimes just clicking a link can begin the process of downloading a file onto your computer. Usually it will require you to open or run the file to do anything truly malicious, but just getting the file on your computer is a bad step!</li></ol></ol></div></div>
</div><div data-element-id="elm_HwH9TjzbDH5B1Z-vEMfVqQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_HwH9TjzbDH5B1Z-vEMfVqQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-size:16px;">Stage 2 (After you click the link)</span></div></div></h2></div>
<div data-element-id="elm_vd5XvFScQvEDSqiI4O9O1w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vd5XvFScQvEDSqiI4O9O1w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><ol><li>Web page asks you to enter login credentials</li><ol><li>This is call phishing or credential harvesting. These bad actors are trying to get your login information. Usually it's an attempt to get your business email login, but it could also be for other things like your Amazon account or bank account. See Brian Krebs great blog on the value of a compromised email account here: <a href="https://krebsonsecurity.com/2013/06/the-value-of-a-hacked-email-account/" title="Reference" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">Reference</a>.<br></li></ol><li>Web page installs a malicious extension</li><ol><li>If a malicious extension is added the bad actor will basically own your browser and be able to read information on web pages you visit including. Many times these extensions fall into &quot;adware&quot; where they will get paid to re-direct your website to a different web page or send you pop up notifications, but they could also be more malicious.</li></ol><li>You open or run a downloaded file</li><ol><li>This could be &quot;game over&quot; on your computer. Depending on the malware this could spring board to installing viruses on your system. Sometimes these files would be an office file with macros, or perhaps just an executable or a PDF that will exploit a vulnerability in Adobe or some other application.</li><li>The reason bad actors may want to do this are many, see Brian Krebs blog on the value of a compromised PC: <span style="text-decoration-line:underline;"><a href="https://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc-revisited/" title="Reference." target="_blank" rel="nofollow noreferrer noopener">Reference</a></span><a href="https://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc-revisited/" title="Reference." target="_blank" rel="nofollow noreferrer noopener">.</a><br></li></ol></ol></div></div>
</div><div data-element-id="elm__eol7u7TS9SVZ4gjR2KDNQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 24 Aug 2023 09:44:02 -0700</pubDate></item><item><title><![CDATA[Top 5 Cyber Security Threats to Small Business]]></title><link>https://www.newfathom.com/blogs/post/Top-5-Cyber-Security-Threats-to-Small-Business</link><description><![CDATA[Top 5 Cyber Security Threats to Small Business]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_-OZw2RzHQjChcGuQsy23ZA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_UDrI0htERuCtKJv7AIW-3g" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_i5KWuJOpS76-Sjn5mMs2HQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_1sSkxIp3Sn-K6R4o1VAUcg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_1sSkxIp3Sn-K6R4o1VAUcg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><h1 style="margin-bottom:15px;font-size:28px;">Top 5 Cyber Security Threats to Small Business</h1></div></h2></div>
<div data-element-id="elm_HgBnDV5nQcmu7_OBz_fKDQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HgBnDV5nQcmu7_OBz_fKDQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:left;">Small businesses are becoming increasingly vulnerable to cyber attacks as more and more business operations are conducted while connected to the internet. Small businesses are often an attractive target for cyber criminals because they typically have weaker security measures than larger organizations, making them easier to breach. In this blog, we will discuss the top 5 cyber security threats small businesses face.</p><ol><li style="text-align:left;">Phishing Attacks</li></ol><p style="text-align:left;">Phishing attacks are a common threat to small businesses. These attacks are designed to trick individuals into giving away sensitive information, such as passwords and credit card numbers. Phishing attacks often come in the form of emails that appear to be from a trusted source, such as a bank or a well-known business. Once the recipient clicks on a link or downloads an attachment, malware is downloaded onto their computer, which in turn could be used to distribute false emails from their account, or deploy ransomware onto their computer or network.</p><ol start="2"><li style="text-align:left;">Ransomware</li></ol><p style="text-align:left;">Ransomware is a type of malware that extract or encrypts a victim's files and demands a ransom in exchange for the decryption key or not posting their data online. Small businesses are often targeted by ransomware because they typically have weaker security measures than larger organizations. If a small business does not have a robust backup system in place, they may be forced to pay the ransom to regain access to their files.</p><ol start="3"><li style="text-align:left;">Password Attacks</li></ol><p style="text-align:left;">Password attacks are a common method used by cyber criminals to gain access to small business accounts. Password attacks can take many forms, such as brute force attacks, dictionary attacks, and social engineering attacks. Small businesses are often vulnerable to password attacks because they tend to use weak passwords and reuse them across multiple accounts, or they have have kept default passwords in place.</p><ol start="4"><li style="text-align:left;">Malware</li></ol><p style="text-align:left;">Malware is a broad term used to describe any software that is designed to harm a computer system or network. Malware can take many forms, such as viruses, trojans, and worms. Small businesses are often targeted by malware because they typically have weaker security measures than larger organizations.&nbsp;</p><ol start="5"><li style="text-align:left;">Insider Threats</li></ol><p style="text-align:left;">Insider threats are a growing concern for small businesses. Insider threats refer to threats that come from within an organization, such as employees, contractors, or vendors. Insider threats can take many forms, such as theft of intellectual property, data breaches, and sabotage. Small businesses are often vulnerable to insider threats because they may not have the resources to conduct thorough background checks or monitor employee behavior.</p><p style="text-align:left;"><br></p><p style="text-align:left;">Conclusion</p><p style="text-align:left;">In conclusion, small businesses face a range of cyber security threats that can lead to data theft, financial loss, and reputational damage. By implementing strong security measures, such as multi-factor authentication, regular software updates, and employee training, small businesses can reduce their risk of cyber attacks. It is important for small businesses to understand the threats they face and take proactive steps to protect themselves.</p></div></div>
</div><div data-element-id="elm_njzokvqvSgChYxKHTkKC_Q" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 03 Apr 2023 16:05:14 -0700</pubDate></item><item><title><![CDATA[We Were Mentioned in Sisters Newspaper!]]></title><link>https://www.newfathom.com/blogs/post/we-were-mentioned-in-sisters-newspaper</link><description><![CDATA[<img align="left" hspace="5" src="https://www.newfathom.com/files/83512.jpg"/>Longtime friends launch IT business...]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_4C0Ke3yBT_SZIVC3C1QSdA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_B_Oqq4XzT3apbHnp2ijn1w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_kiJ8v2yIT4W1c7HSEUCGoA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_kiJ8v2yIT4W1c7HSEUCGoA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_6RJeqOrFWoucqIUjxC6ADA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> [data-element-id="elm_6RJeqOrFWoucqIUjxC6ADA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/83512.jpg" data-src="/files/83512.jpg" size="small" data-lightbox="true" style="width:480px;padding:0px;margin:0px;"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true">Longtime friends launch IT business</h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p></p><p></p><p></p><p><span style="color:inherit;font-size:16px;">As seniors in high school back in 2005-06, Harrison Womack and Chadbourne Lovegren both served as student interns for the now-well-known IEE (Integrated Environmental Expedition) program at Sisters High School. Working together to lead students, as well as adults, on a trip into the Three Sisters Wilderness and later on a rafting excursion on the Deschutes River, along with the daily work in the class, deepened their friendship and gave them a foundation of confidence that they say helped them arrive back in Sisters where they began a business as partners in an Information Technology (IT) company called New Fathom IT...</span></p><br></div>
</div></div></div><div data-element-id="elm_gcx3EcvzQ7Oq7ZoBQK782Q" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_gcx3EcvzQ7Oq7ZoBQK782Q"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://nuggetnews.com/Content/Business/Business/Article/Longtime-friends-launch-IT-business/7/88/29230" target="_blank" rel="nofollow noreferrer noopener"><span class="zpbutton-content">Read the Full Article</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 22 Dec 2020 09:02:56 -0800</pubDate></item><item><title><![CDATA[Manage Your Tech, Free Your Time]]></title><link>https://www.newfathom.com/blogs/post/why-managed-services</link><description><![CDATA[<img align="left" hspace="5" src="https://www.newfathom.com/files/alexander-andrews-X62F1WQhuLI-unsplash.jpg"/>Do you enjoy putting out fires in your business? I sure don't. What if there was a way to focus on what matters most and not live crisis to crisis?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_F7Sw11EHxHqBp9piGEEJPA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_F7Sw11EHxHqBp9piGEEJPA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ifSY8x24GBQ6S1yWetKySg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_ifSY8x24GBQ6S1yWetKySg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_AkC9qN-zmjGBTgjXHb6CcQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_AkC9qN-zmjGBTgjXHb6CcQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_moUMGpFGQWi6qbGDzvw7vQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_moUMGpFGQWi6qbGDzvw7vQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-left " data-editor="true">How Can I Free My Time?</h2></div>
<div data-element-id="elm_-bxm6SClikmAQf0fzkOp9A" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column=""><style type="text/css"> [data-element-id="elm_-bxm6SClikmAQf0fzkOp9A"].zprow{ border-radius:1px; } </style><div data-element-id="elm_ZiBnjUcu849Qzy7byIWNvw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_KIbwqNcB7WZOpjO-9pevVw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_KIbwqNcB7WZOpjO-9pevVw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/30743916_10101028714995199_1273909852866871296_n.jpg" size="fit" style="height:316.75px;width:253px;"/></picture></span></figure></div>
</div></div><div data-element-id="elm_hEBBALKeDP2KQPD3QTk17Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_hEBBALKeDP2KQPD3QTk17Q"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_x5sFgt_WQNuK02ksR7nAVA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_x5sFgt_WQNuK02ksR7nAVA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Do you enjoy putting out fires in your business? I sure don't. It's the worst when my network goes down, my computer freezes, or that program simply doesn't do what it is supposed to do. What if there was a way to focus on what matters most and not live crisis to crisis?</p><p><br></p><p>You purchase internet, that special program that allows you to conduct business, and hopefully antivirus for your computers. Is that enough? Well, you don't purchase a car and just run it till it breaks down. You change the oil and perform preventative maintenance. Unfortunately, it&nbsp;doesn't stop at the computer purchase or initial network setup. You need to make sure you are doing the preventative maintenance to keep it working. This is where m<span style="color:inherit;">anaged services come in to free up your time. They allow you to proactively manage your tech to keep it working in tip-top shape.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_wlIckj8fAk9SJAQdErDdoA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_wlIckj8fAk9SJAQdErDdoA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_b0wyM5gctcXzeHBJAoKYAA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_b0wyM5gctcXzeHBJAoKYAA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_VCuaaP7dcDZ_w4xoUdAXFA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_VCuaaP7dcDZ_w4xoUdAXFA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Here are a few of the things that managed services can do for you:</p><ul><li>Keep your&nbsp;<span style="font-weight:bold;">computers up-to-date,</span>&nbsp;such as the following:</li><ul><li>Operating system (OS)</li><li>Antivirus and device security</li><li>Software and drivers</li><li>Firmware and BIOS</li></ul><li>Keep your&nbsp;<span style="font-weight:bold;">network up-to-date</span></li><li>Monitor&nbsp;<span style="font-weight:bold;">network performance</span>&nbsp;and&nbsp;<span style="font-weight:bold;">internet connectivity</span></li><li>Manage&nbsp;<span style="font-weight:bold;">assets and their warranties</span></li><li>Provide remote access for&nbsp;<span style="font-weight:bold;">rapid support and recovery</span>&nbsp;when things inevitably do go wrong</li><li><span style="font-weight:bold;">Guarantee support response times</span>&nbsp;so you are back up and running as quickly as possible in the event something does go wrong</li></ul><p><span style="color:inherit;"></span></p><p><span><br></span></p><p><span style="color:inherit;">As an alternative to managed services, you could try hiring an IT person at an on-demand or break-fix capacity. However, you might not find it worthwhile if you're constantly stuck in crisis mode or you have employees being paid to just sit there? Your time is valuable. It only takes one catastrophe - that could have been avoided by a little preventative maintenance - to payback the cost of years of managed services.&nbsp;</span><span style="color:inherit;">In the same way you don't run your car into the ground, you don't want to run your tech into the ground. If nothing else, your tech gets you from point A to B.</span><span><br></span></p><p><span><br></span></p><p><span>You could also try the DIY approach to IT. If your business is very small and you're fairly tech savvy, then you might be able to handle your tech needs. However, if you're running a business larger than one or two people, the indirect costs associated with downtime and inefficiencies can quickly make it not worth the effort. More of your time means more opportunities to grow your business and more of doing what matters most to you.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_rZD5t_QQTi6Cmuwif2CKJQ" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_rZD5t_QQTi6Cmuwif2CKJQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_rk38GlULSa2kV4bOC69DjA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_rk38GlULSa2kV4bOC69DjA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_1_ps-UToSFuTpeMFPzqGyQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_SXMpnlYBE7WL2mCnyFUsig" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column=""><style type="text/css"> [data-element-id="elm_SXMpnlYBE7WL2mCnyFUsig"].zprow{ border-radius:1px; } </style><div data-element-id="elm_Hcx0_V0ejr_K9gOZkfLEnA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_PjzFbbowyTH5Cu4wNR5yiw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_PjzFbbowyTH5Cu4wNR5yiw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-type3 zpheading-align-left " data-editor="true">&quot;Tech is like a car that needs preventative maintenance.&quot;</h2></div>
</div><div data-element-id="elm_J_YqvBHK93OvFVWzwa6R9A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_8OFgw6VfpynQtm5BaQFZmA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_8OFgw6VfpynQtm5BaQFZmA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/kenny-luo-1286691-unsplash.jpg" size="fit"/></picture></span></figure></div>
</div></div></div></div></div></div></div><div data-element-id="elm_a7SLWq99Q4_6I2la1b7Cjw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_a7SLWq99Q4_6I2la1b7Cjw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_iQ7jIZb5Ne8UCS4iVptlxg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_iQ7jIZb5Ne8UCS4iVptlxg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_XW2eLhf0vgg0sxy_6CSDuQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_XW2eLhf0vgg0sxy_6CSDuQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_3YCEcUSImhlVPtg_q6VCnA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_3YCEcUSImhlVPtg_q6VCnA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Why Managed Services?</h2></div>
<div data-element-id="elm_6vbe1h2vxIofbikcWlM7UQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6vbe1h2vxIofbikcWlM7UQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Do you hire a mechanic to change the oil, belts, seals, filters, etc. in your car? If so, you probably do it because its not worth your time to learn or purchase the tools to keep your car running. It's the same with IT. The tech in your business is like a car that will break down if you don't perform preventative maintenance. You could spend your valuable time learning how to do it yourself or hire the pros to help.</p><p><br></p><p>Additionally, the world is full of dirt, gravel, and other debris that are waiting for their chance to get into your car and wreck havoc. The world is also full of bots and cyber criminals that are trying to get into your tech. Without the proper proactive actions and protections you are a sitting target. Don't worry. Managed services greatly help to improve your cyber security posture. They ensure your systems are up-to-date and protected with antivirus and other critical safeguards.</p></div>
</div></div></div></div></div><div data-element-id="elm_vLXS_T_dTZJVLQhk7UOrnw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_vLXS_T_dTZJVLQhk7UOrnw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Txkc6bfOaafI3rvpMXlKEw" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-center " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_fDOWg_IylrQef0LrQyuPrw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_TBU2e6ZVuEYA3l8inI1mqA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_TBU2e6ZVuEYA3l8inI1mqA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/charles-Lks7vei-eAg-unsplash.jpg" size="medium" style="width:1600px;padding:0px;margin:0px;"/></picture></span></figure></div>
</div></div><div data-element-id="elm_ooCV9_DjA1c_ujgDzFZjkA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_AXBkSE5IGxfCt5IqNK_SSg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_AXBkSE5IGxfCt5IqNK_SSg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Free Your Time</h2></div>
<div data-element-id="elm_lraklV-wX2sg9kpHcoVSnQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_lraklV-wX2sg9kpHcoVSnQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p>Start managing the tech of your business with managed services and it'll pay off in spades.</p></div>
</div><div data-element-id="elm_skWEe0K6D2eUdYFdRGDVHw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_skWEe0K6D2eUdYFdRGDVHw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact"><span class="zpbutton-content">Get Started</span></a></div>
</div></div><div data-element-id="elm_ABSZYBUC9R1sCBKq67KGew" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_MlDzNuWe3kgM5M3hkVjbPw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_MlDzNuWe3kgM5M3hkVjbPw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/zpstock-image-213.jpg" size="medium" style="width:1421px;padding:0px;margin:0px;"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_orwKlIph78Aag1jtMpcauA" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_orwKlIph78Aag1jtMpcauA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Jg4H62PsL3o_JSE3lAh3sg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_Jg4H62PsL3o_JSE3lAh3sg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_ayZWSa7Fqz0MPOvTpELJIQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_tdVgkTdH3D32z-YekYNrkw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_tdVgkTdH3D32z-YekYNrkw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Where Did Managed Services Come From?</h2></div>
<div data-element-id="elm_-fniQsRkfOmmem17SPoB_A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-fniQsRkfOmmem17SPoB_A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Historically, companies hired in-house IT technicians or outsourced for break-fix IT support. Most of this support was reactive - when something broke, a technician came to fix it. As companies began to depend more and more on uninterrupted and reliable technology, proactive IT support became the standard. If you are still relying on reactive IT support, you are falling behind. If you want your business to grow and thrive in these modern times, it's time to consider moving from reactive break-fix support to proactive managed services.</span><br></p></div>
</div><div data-element-id="elm_6lYOHl5F6MOJgMyni0JpaQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_6lYOHl5F6MOJgMyni0JpaQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">What Can I Do?</h2></div>
<div data-element-id="elm_gkX7UnnMZMIPfmxhefCzOw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gkX7UnnMZMIPfmxhefCzOw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Take the next step. Move away from the crisis-life to a rich and fulfilling one where you can focus on what matters most. Start managing the tech of your business with managed services.</p></div>
</div><div data-element-id="elm_Nbg2XR4OJtqhdWbyzFRxQQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_Nbg2XR4OJtqhdWbyzFRxQQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact"><span class="zpbutton-content">Get Started</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 04 Nov 2020 16:55:27 -0800</pubDate></item></channel></rss>