Department of Technology & Information Security

About Us


Technology is becoming more and more complex.  And although people are becoming more accustomed to using it, the fact remains that most people don’t know enough to use it safely, or may not even be aware that they are in danger to begin with.  Everything has vulnerabilities and weak spots, and things are changing on a daily basis.  Unfortunately, most home or small business users assume the free trial software that came with their new computer will protect them for years to come.

If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked.
— White House Cybersecurity Advisor, Richard Clarke

Protection should start (or stop) at the computer.  You have to consider everything from physical access to the cables entering the building to the wireless router and other devices connected to your network.  You could have the best firewall money can buy, but if your WiFi isn’t secured and someone gets onto your network while sitting in their car on the curb, they could potentially do a lot of damage.

Not only could they get access to steal or destroy the files stored on your computer or network server, they could access other devices on your network and make damaging or unwanted changes to those devices or use them against you, such as viewing internal security or “nanny” cameras to spy on you.  Some people may never know their network and data were compromised, or the connection to a later event (such as identity theft) may never be linked back to the insecurities in the network that allowed the information to be stolen in the first place.

Hardware is easy to protect: lock it in a room, chain it to a desk, or buy a spare. Information poses more of a problem. It can exist in more than one place; be transported halfway across the planet in seconds; and be stolen without your knowledge.
— Bruce Schneier (Protect Your Macintosh, 1994)

Our goal is to not only secure your networks, computers, software, and devices, but to also educate you on best practices for keeping yourself and your loved ones safe while using technology.  Let us take the guesswork out of the most important part of your online experience rather than dealing with it after it’s too late.

Security breaches usually entail more recovery efforts than acts of God. Unlike proverbial lightning, breaches of security can be counted on to strike twice unless the route of compromise has been shut off.

Most larger companies have at least a “person”, if not an entire team, whose job it is to maintain the security of their technology and information.  Individual home users, and small businesses typically don’t.  A lot of times, the “computer guy” for small businesses ends up being a relative, friend, or friend of a friend who “knows about computers” and they call only when there’s an issue they can’t figure out.  Home users are just as bad, if not worse, combining the collective knowledge of several family members who barely know enough to check their email.  And when something goes wrong, if they even recognize that something IS wrong, it may go unchecked for a long time before they seek help.  And only after all options are exhausted and they are faced with taking it to a “professional” for under $100 or purchasing a new computer will they consider dealing with the issue.

We want to make it not only affordable to have an initial assessment done, but offer additional incentives such as education to help prevent future issues and give our users somewhere to start when an issue arises.  If a stranger were to enter your home, you wouldn’t just try to ignore them hoping they would leave and only call the police when it got so bad or annoying that you really didn’t want to deal with it anymore.  The same thing should apply to your computer and network.  At the first sign that something may be wrong, you should be trying to find the issue and remove the intruding malware, virus, or whatever it might be.  Especially with the recent increase of “ransomware” that takes your computer and files hostage, requesting a financial payment to release them.

Please consider contacting us today and scheduling an assessment of your network and computer systems.  We will identify weaknesses in your network or internet setup, computer software, and physical access if relevant.  We will offer suggestions to fix the issues we find, and can implement them for you if you want.  And we will provide education on what to look out for, how to identify scams, fraud, and potential issues, as well as basic suggestions on where to begin if you suspect something’s wrong.

1180 Total Views 1 Views Today

© 2014 DTIS: Department of Technology & Information Security