• Is Your Law Firm Doing Everything Possible to Protect Client Data?

    Working with client information can be a challenge, especially when your staff needs immediate access to sensitive data. Law firm technology professionals have been wrestling with the thorny problem of balancing information access with security and compliance for many years, but is your law firm taking all possible steps to protect personal and confidential client data? Here are a few of the ways that law firms are protecting their clients -- and their infrastructure -- from cybercrime.
  • Coretelligent Tops the Elite 150 Category of the MSP 500 from CRN   

    Coretelligent, a leading provider of comprehensive managed IT and private cloud services, announced today that they have once again been granted a spot on the coveted Managed Service Provider (MSP) 500 list for 2019 in the Elite 150 category.
  • How to Become a Cyber Security Expert

    Becoming a cyber security expert starts with a thorough understanding of the various systems that can interconnect within any business. This isn't information that you can gather overnight, or by simply studying a few books -- it takes time and experience to see how everything works together. There are thousands of computer systems and literally millions of ways that systems and software can be configured together. The change in the cyber security industry on an annual basis is staggering, so it's imperative to be a lifelong learner if you're interested in becoming a cyber security expert. Here are some ways to become a cyber security expert.
  • Whats Considered a Data Breach

    The words "data breach" are enough to throw fear into the hearts of IT security professionals and business people across alike. There are so many potential repercussions when something happens to your sensitive data. Customers leaving. The cost of notification. News stories that share your predicament with the world. Time spent away from other projects on cleanup and remediation of any holes. It can be almost paralyzing to think about the long-term negative effects on your business, but are you truly clear on what is considered a data breach?