See what we’re up to.
Changes to Our Microsoft Office 365 Admin Access
Microsoft has been transitioning from the old Delegated Admin Privileges (DAP) system to a new, more secure model called Granular Delegated Admin Privileges (GDAP). Because of this, there's been an important update to how we manage our administrative access to your Microsoft Office 365 account. What is GDAP? GDAP …
HP Elite PCs and Z Workstations
Technology that gives your business the competitive edge Seamless and secure communication fosters collaboration, enhances productivity, and promotes adaptability. It empowers teams to efficiently navigate diverse work environments, ensure timely decision-making and maintain a cohesive corporate culture across physical and virtual spaces. Simply put, optimized communication gives your business …
CTComp 2024 Technology Trends
Thank you so much to everyone who joined our 2024 Technology Infrastructure Trends event January 25th—we had a great time hosting you in Essex, Connecticut. For anyone who missed it, the CTComp team was joined by experts from Cisco, HPE, and Verkada to discuss market strategies and technology trends for …
CTComp Municipalities
In 2022, the FBI issued a Private Industry Notification to local governments and public services: Bad cyber actors have been "conducting ransomware attacks on local government agencies," which have resulted in "disrupted operational services, risks to public safety, and financial losses." Even more concerning? According to incident reporting for …
CTComp Engineering
Earlier in the year, Construction Business Owner Magazine outlined how engineering and construction firms would handle emerging technologies in 2023. Despite the sector being "historically slow in integrating and adopting digital technologies," industry leaders are now "increasingly paying attention to and leveraging emerging technologies." These technologies include, but aren’t limited …
How to Prevent Data Theft and Empower Your Healthcare Infrastructure
The attack surface for healthcare organizations is growing every day. Vulnerabilities compromising security postures include: Legacy systems Fragmented infrastructures Innumerous applications and IoT devices And much more. Let’s take a moment to talk about legacy systems—legacy operating systems and other software present a significant vulnerability to healthcare organizations. Why? …
How to Keep Your Network Secure with Hybrid Workers
There’s no denying it—remote and hybrid work is here to stay. Gartner reports that 74% of CFOs intend to permanently shift some employees to remote work. And while it sounds great in theory, it’s essential to consider hybrid workers’ role in your security posture—because it turns out hackers …
Weak Passwords Compromise Printer Security—Did You Know That?
Did you know your organization's printers can be a hole in your security posture? Microsoft reports over 300 million fraudulent sign-in attempts to their cloud services every day—and according to the Ponemon Institute, the average person has at least five accounts with the same password. When (not if) hackers …
Why Your Business Needs Updated Network Security to Maintain Compliance
In today’s world, companies (and employees) have access to more sensitive data than ever before. That means increasing network security and compliance measures are more important than ever. And this is especially true for states like Connecticut, California, Utah, Colorado, and Virginia, which have “passed their own comprehensive consumer privacy …
3 Best Practices for More Proactive and Successful IT Roadmaps
How you can have confidence creating a custom IT solution. While 71% of senior IT executives worldwide recognize IT infrastructure as essential in enabling competitive advantage and maximum revenue, recognizing and acting are two completely different things. When optimizing your technology infrastructure and integrations, knowing where to start and what …
5 Solid Reasons Why Your Business Needs Compliance as a Service (CaaS)
How Compliance Empowers a Good Security Posture "If you think compliance is expensive, try noncompliance." – Paul McNulty, former US deputy attorney general. If this is how your business has historically viewed compliance, it's time for a paradigm shift. When implemented correctly and routinely evaluated, compliance is key to …
What’s the log4j Flaw? 4 Things Your Business Needs to Know Today
There is another critical vulnerability sweeping the IT world. A flaw in log4j, a Java library for logging messages in applications, could allow for remote code execution by a bad actor. Any device that is running log4j and exposed to the Internet is at risk. Many hardware and software …