Skip to main content

Blog

Guide Star Blog

Cybersecurity | Cybercrime | Security

By: Evan Rice
November 15th, 2022

Cybersecurity has become one of the most pressing issues for businesses of all sizes, especially small to medium-sized businesses (SMBs). As technologies change and advance, it becomes increasingly important to establish a cybersecurity program for your business.

Cybersecurity | Security

By: Evan Rice
November 2nd, 2022

In our latest episode of The Good, Bad, and the Ugly series, Evan talks about why you need Authentication as part of your cybersecurity plan.

Cybersecurity | Security | IT Support

By: Evan Rice
October 18th, 2022

In our previous blog, we discussed who the Red and Blue Teams are, what they do, and how they are different from each other. We also talked about the emergence of a new team- the Purple Team. The Purple Team is essentially a combination of both the Red and Blue Teams and ensures both teams are working towards a common goal- which is securing your organization.

Cybersecurity | Security

By: Evan Rice
August 30th, 2022

In our latest episode of The Good, Bad, and the Ugly series, Evan talks about why you need a good Cybersecurity Training Program in your organization.

Cybersecurity | Security

By: Evan Rice
July 18th, 2022

Do you know what it takes to make a GOOD password? Chances are your passwords aren't secure and could be easily guessed. If your passwords are hacked, your personal data and information could be at risk. Watch this video, The Good, Bad, and the Ugly: Passwords, to understand what it takes to have a good password and ensure you aren't vulnerable to hackers. 

Cybersecurity | Cybercrime | Support Services | Security | IT Support

By: Larry Davis
July 5th, 2022

Information technology is a critical component of running a successful business. Having effective and innovative technology ensures the success of your business and can help you generate more revenue. However, if your technology is not up to date or managed well, it can cost you time, money, customers, and more.

Cybersecurity | Support Services | Security

By: Evan Rice
June 28th, 2022

As we are all too familiar with, data breaches and cybercrimes are on the rise and causing major headaches and financial loss for businesses of all sizes. Cybercriminals want us to believe that large corporations are the only businesses getting hacked, however, small to medium-sized businesses (SMBs) are just as susceptible to cybercrime. In fact, 43% of cyber attacks target small businesses, according to Verizon’s 2020 Data Breach Investigations Report.

Cybersecurity | Security

By: Larry Davis
June 28th, 2022

As today’s technologies continue to change, small to medium-sized businesses (SMBs) should have a solid IT infrastructure in place to meet the demands of their business. At Guide Star, we assist SMBs maintain and support their IT infrastructure. We offer a set of services to keep your IT running up to spec and your IT users well supported.

Disaster Recovery | Cybersecurity | Cybercrime | Support Services | Security | Consulting

By: Larry Davis
May 24th, 2022

The Importance of Saved Images At Guide Star, we have top-tier IT security practitioners, also known as our Blue Team, that engage with small and medium-sized business (SMB) owners and managers. Our blue team experts implement means and methods to mitigate cyber risk as well as arm your organization against future threats.

Security | Consulting

By: Evan Rice
April 6th, 2022

Managing your company’s data can be a tall task for any business, and every business will have a system that is owned and operated by a third party provider.  Many choose to utilize a third party storage system for storing their data and assets. One of the more prominent examples of this is the cloud. It is becoming increasingly common for businesses to explore the option of moving their storage from a traditional server structure to a cloud-based model.   The Department of Labor’s (DOL) best security practices for ESOPs recommend performing security reviews of the data you have stored on the cloud. While conducting a timely security review for the cloud is important, it’s critical to conduct these reviews for any third party IT structure you house data on. Better than safe than sorry.