Blog: Security

Are you who you say you are?

Controlling access to information is the key objective of computer security measures. And, a fundamental aspect of security is determining whether users are who they say they are when they attempt to log into accounts. Blue Cross Blue Shield/Anthem, Equifax, Verizon, U.S. Securities and Exchange Commission, Deloitte and Whole Foods Market represent data breaches happening... Read More

cloud computing checklist

CPA’s 2018 Pre-Tax Season Cloud Computing Checklist

With 60-to-90-hour work weeks during tax season and pressing deadlines for filing or requesting extensions, there’s no room for technology troubles. But, inevitably, they crop up—VPN access goes down, shared files don’t sync properly or there’s latency accessing your accounting software. And of course, this happens when you’re at home after already putting in more than 15 hours. What if you... Read More

Ransomware Update: 2017’s Impact to Date

Remember us talking about ransomware— malicious software that encrypts files, blocks access to computer systems and requires an anonymous payment— and how it was going to disrupt a lot of businesses this year? Well, unfortunately, we were right. According to a CNN report, ransomware is on track to become a $1 Billion industry. Since the... Read More

How safe is cloud computing?

More companies are beginning to swap their traditional tangible data storage for cloud storage, but how safe is cloud computing? While no system is one hundred percent reliable, cloud computing is actually safer than on-site data storage. The data stored in the cloud is protected by multiple levels of security. There are layers of firewalls,... Read More

Top 10 Reasons to Move to the Cloud

With everyone talking about Cloud computing and why it’s so important to move to the Cloud, Cetrom IT wanted to offer a quick and easy list of 10 reasons why WE think it’s a good idea to move to the Cloud. Access to your IT data and 150+ leading technology applications anytime, anywhere, anyhow. Tier-4... Read More