Cybersecurity and What You Can Do To Prepare, Part Three

To summarize where are, we have talked about identifying your assets and your risks. The next step is to begin using this information in a logical way. The risk assessment component will be used to develop your Risk Management Strategy. Management must establish their risk tolerances in order to evaluate the how they will approach… Read more »

Cybersecurity and What You Can Do To Prepare, Part Two

We have gone through the process of identifying the assets in our network. Now we have to risk rate them. Many of you have plenty of experience in Risk Assessments so this may be a refresher for you. The purpose of a risk assessment is to prioritize the use of limited resources in order to… Read more »

Cybersecurity and What You Can Do To Prepare

Let’s start by asking why someone would want to break into your network. When hacking first started back in the 80’s it was generally done for bragging rights. Hackers have now found that there is money to be made from information. It is easy to understand that stolen credit card information could be used to… Read more »

Who’s Email is it, Anyway?

The mission of deTECH is to break down complicated IT topics into more palatable bites for consumption by both technical and non-technical audiences.  Unless a security or regulatory issue arises that we think is important to you, we avoid topical discussion and keep things fairly vanilla, with a few bad jokes tossed in for good… Read more »

Accessing Your Information

Last week’s article on creating strong passwords struck a chord. We received quite a lot of feedback and appreciate all of your comments. A less-snarky version even found its way into Virginia Business. And yes, you are welcomed to forward any deTECH article to your staff, boss, neighbor, kids or parents. Password security is very… Read more »

Staying Out of the Hall of Shame

Anthem’s event was described as a ‘sophisticated attack’ and there is lots of great information on the web if you are interested in the particulars. I would like to discuss some of the finer points of this attack and how we can use this information to help protect ourselves. Let’s discuss some of these defenses…. Read more »

Small Taxpayer Relief from the Tangible Property Regulations

Last Friday, February 13th, 2015, the IRS issued Rev. Proc. 2015-20, which offers some relief to small taxpayers from the newly implemented tangible property regulations. While all taxpayers are still required to follow the tangible property regulations on a prospective basis (additions and dispositions beginning January 1, 2014), small taxpayers are no longer required to… Read more »

Back to Basics: Password Security

Think about passwords like the keys on your key ring. Would you install a lock on your home, car, or safe with a generic key used by lots of other people? I hope not. Consider a password a key that you can design yourself. With a little forethought and planning, your passwords can be strong… Read more »

Part 2 – Administering and Closing the Estate

In my previous article, I discussed some of the initial steps a personal representative should take to begin the estate administration process, including qualifying as the personal representative of the estate, obtaining an EIN number and transferring the decedent’s assets into the estate.  In today’s article, I am going to discuss other issues relating to… Read more »

Asset Management

Historically management provided IT with a listing of assets for review. This listing was maintained to track physical assets and software for depreciation purposes. As our reliance on technology has increased, this listing has grown, and now some IT departments are independently tracking their assets. If your IT department doesn’t have a complete inventory of… Read more »