Free Webinar October 8th, 2025
Protect Your Data – Empower Your Team!
Join CCI and our cybersecurity partner WatchGuard Technologies for an exclusive event designed to help organizations strengthen their IT defenses and streamline secure access.
It’s like a never-ending game of cat and mouse. The cycle starts with software hackers exploiting vulnerabilities in software networks before the users and manufacturers know about them, stealing data and reaping financial booty (e.g., ransomware attacks). Software manufacturers respond by releasing patches to fix the holes in the security armor. And finally, IT… Read More »
How IT Hiring and Firing Policies Could Expose Your Business to Risk It was Pauline’s first day at “HiTech Software, Inc.” where she would be a new hire software engineer. She was happy to be introduced to her new cubicle and new colleagues, but disappointed when she discovered the computer equipment and applications she would… Read More »
Disposing IT equipment may create high risk to your organization You decided it’s time to finally upgrade your company servers. The old ones got removed, the new ones installed, and now they are already being used in operations. Everyone is happy and reporting improvements in critical application performance. But wait, where did the old servers… Read More »
Did you know that most company security breaches are caused by employee misuse of passwords? You would think that, with all the security training programs companies require their employees to sit through these days, password problems would no longer be a major cause of security intrusions. Perhaps employees should do more than “sit through”… Read More »
How easily can a thief grab private data on your laptop? Have you or somebody you know ever had this something similar happen? …You are sitting in a busy cafe talking on your phone and don’t notice that a person walks behind you and stealthily lifts your laptop out of your open bag near you.… Read More »
CCI’s roots as a local computer and technology retailer taught us the value of communicating in a thorough, accurate and cheerful manner. Starting up in the late 1980s, we learned the immense value of clear communications in the building of mutually beneficial relationships. As time went on and markets evolved, our clients needed more than… Read More »
It’s important to know a few things about your backups. First, is there any way they could be encrypted or deleted during an attack. And second, can the data be stolen while in transmission or at rest? An “Air Gap” is Crucial Start by looking at what accounts can access the backup software and the… Read More »
You’ve got a working BDR (Backup Disaster Recovery) system that’s backing up all your critical systems and you’re confident you can restore a file, a folder, an application or the whole system in a reasonable timeframe. So now let’s make sure we don’t have any surprises. Who and how is this being monitored? A good… Read More »
Data is like a box of chocolates! Some data is of very high value, and some is far less so. A healthy percentage of what most businesses backup isn’t really data at all! How’s that you might ask? Servers run an operating system that gets patched and many also run applications of some kind. These… Read More »
You’ve invested in a modern backup and disaster recovery (BDR) solution and now sleep more soundly at night, but the hardware itself is really only part of the solution. Now you want to ensure it will 100% work and provide both your data and a rapid resumption of operations when disaster strikes. Now is the… Read More »
Want a free on-site assessment?
Give us a call at (603) 542-5109
or send us a message!