Blog: IT security

John Graham, Graham & Co – Security

Before, if something happened to our server, the company would be dead in the water. With Cetrom, my data undergoes multiple backups and is stored in secure data centers in different geographical areas. I don’t have to worry about data recovery; they can recover it. And, there is always someone available to quickly resolve technical... Read More

Karin Teles, DP&C – Services & Support

Cetrom’s services and support really stood out against the other cloud vendors. We thought their Citrix delivery platform would have a higher level of adoption because our employees would have the same desktop setup that they have grown accustomed to using– and it has. Cetrom also stressed the importance of their backups, data redundancies and... Read More

Are you who you say you are?

Controlling access to information is the key objective of computer security measures. And, a fundamental aspect of security is determining whether users are who they say they are when they attempt to log into accounts. Blue Cross Blue Shield/Anthem, Equifax, Verizon, U.S. Securities and Exchange Commission, Deloitte and Whole Foods Market represent data breaches happening... Read More