1. Physical Security Isn’t Just Locks on the Doors

    Do you have a computer time out policy that turns off your screen within a few minutes of walking away? Do you have sticky notes on your monitor or passwords under your keyboard? Is your smartphone (with your business email on it) password protected? Are the network jacks in your public areas secure? Are your monitors turned so that the general public walking by in the hall can't see your screens?…Read More

  2. Be Security Aware with Healthcare Internet of Things

    At the recent Cybersecurity Symposium in Cheyenne, Mike Borowczak, a University of Wyoming security professor in the Computer Science department, discussed the Internet of Things and Security.  A few of the examples given were hospital or healthcare related and Medicine Bow Technologies wanted to share them with our customers. One of the most surprising data points was that Casper was number two …Read More

  3. New Ransomware Variant Targets Hospitals

    From Becker's Hospital Review; Written by Jessica Kim Cohen | April 11, 2017 |  http://www.beckershospitalreview.com/healthcare-information-technology/new-ransomware-variant-targets-hospitals.html A new ransomware kit called Philadelphia enables amateur cybercriminals to target hospitals, according to an analysis by Forcepoint, an Austin, Texas-based IT security company. Philadelphia, which Fo…Read More

  4. Wyoming Women’s Business Center Presents Cyber Security for Small Businesses

    ROUNDTABLE Wyoming Women’s Business Center Thursday, April 13th, 8:30-9:45 A.M. Laramie Plains Civic Center, Conference Room 208 710 Garfield St, Laramie, WY Join us in this FREE networking opportunity; meet other business owners! Bring a friend! RSVP: wwbc@uwyo.edu or call 307-460-3948 TOPIC:  Cyber Security for Small Businesses Learn the terminology so you can speak with your IT company. Lea…Read More

  5. Protect Your Computer From Hackers, Data Thieves and Everything Else!

    The Wyoming SBDC (Small Business Development Center) Network is hosting a webinar on Thursday, April 5 from 2-3 p.m. Mountain Time entitled "Protect Your Computer From Hackers, Data Thieves and Everything Else!" Are you worried your business or personal computer systems are going to be hacked? Do you worry that you may become a victim of Ransomware or other attack?   Join this session with Laura…Read More

  6. Break Fix Versus Managed Services for Information Technology

    Break-Fix The traditional method of IT management for smaller companies is break-fix.  What is break fix? Examples of a company that relies on break-fix information technology methods are shown below. You only call your information technology company when there is a problem. Equipment breaks and you either fix it or replace it. You have a do-it-yourself backup system that replicates to an externa…Read More