On Point Blogs – Page 2 – Dewpoint
  
The majority of companies using cloud-based services will be living in a hybrid deployment world for the foreseeable future. Data and analytics leaders must understand the risks and benefits in using the primary scenarios for hybrid cloud Database management system (DBMS), and how they align with core use cases and architectures. Dewpoint recommends the following:…

READ MORE

Increased Phishing Activity Bulletin

This security alert bulletin is to advise you of an increase in phishing activity noted by several Dewpoint clients.  To reduce the risk of being a victim we recommend organizations adhere to good IT security practices specifically in the areas of username and password management. To reduce becoming a phishing target, stress to your staff…

READ MORE

Security – If Nothing Else, Do the Basics

Protecting your organization can be as complex or as simple as you feel is right for your organization. Research has shown that organizations that consistently do the functions listed in the Center for Internet Security (CIS) Top 10 can reduce your risk posture by up to 80% The Top 10 activities are as follows: Inventory…

Tags:

READ MORE

Malicious Intrusions Remain a Problem—and One That is Growing Malicious intrusions are a big problem. 42% of security leaders in a recent Forrester Consulting study said they have experienced a security breach during the past two years. Another study by ISACA found that 80% of security leaders believe their organization will experience a security attack…

READ MORE

Cybersecurity Threats Within Your Organization

Cybersecurity Threats Within Your Organization We are all aware of cybersecurity threats from anonymous persons outside our organization, but have you thought about threats from within your organization? Does your security training include implementing steps to minimize the threats from within? Below are a few examples of inside threats to consider and include in your…

Tags:

READ MORE

Evaluating Your Cybersecurity Risk

 Your cybersecurity risk may depend on the industry you are in and the size and location of your company. The more employees you have, the more locations, the more complexity and the more personal identifiable data your company maintains. the greater risk of a cybersecurity attack. To determine your company’s risk, you should evaluate the…

Tags:

READ MORE

Dark Data – The Next Frontier

Dark Data – The Next Frontier A majority of organizations have data saved that is no longer used or valuable. Think about all of the digital documents saved in a typical organization ranging from email to presentations to spreadsheets complied by current and former employees.   A majority of organizations have data saved that is…

Tags:

READ MORE

Ransomware –Simple Steps to Prevent

Ransomware –Simple Steps to Prevent Regardless if you are an individual or business you are a ransomware target. Ransomware is defined as the outcome of a malware infection that leads to the unwanted encryption of data. The only way to unencrypt the data is through paying the attackers.  Regardless if you are an individual or…

READ MORE

Five Communication Considerations for Project Success What is the number one critical factor in determining a project’s success or failure that often receives the least attention? Communication. Yes, that’s right. Communication. While schedule, scope, and budget are the project iron triangle constraints, communication is the glue that holds them together. Effective communication ensures all stakeholders…

READ MORE

Dewpoint Provides GIS Support

Dewpoint Provides GIS Support What is GIS? Geographic Information Systems (GIS) can be loosely described as “computerized mapping”. Hardware, software, and collections of data construct the modern computer map making technology. The collected information is made into a point, line, or polygon layer that is referenced to actual locations on Earth. Several layers of information…

READ MORE

LANSING
Knapp's Centre, Suite 200
300 S. Washington Square
Lansing, Michigan 48933
Phone: (517) 316-2860

GRAND RAPIDS
333 Bridge Street NW Suite 505 
Grand Rapids, Michigan 49504
Phone: (517) 316-2860

SOUTHEAST MICHIGAN
805 Oakwood Drive, Suite 108
Rochester, Michigan 48307
Phone: (248) 413-6108

CONNECT WITH US

https://www.facebook.com/DewpointInc/   https://www.linkedin.com/company/dewpoint/