The CFO’s Guide to Choosing an MSP helps executives identify and select an MSP that adds strategic value to your organization, not just control IT costs.
Search results
Privacy Policy
Privacy Policy Last updated: January 24, 2024 This Privacy Policy describes Our policies and procedures on the collection, use and disclosure of Your information when You use the Service and tells You about Your privacy rights and how the law protects You. We use Your...
Cybersecurity Solutions for Banks
Reduce cybersecurity risk, safeguard critical infrastructure, and protect sensitive customer dataWaident's Cybersecurity Services for Banks In the financial industry, cybersecurity should never be an afterthought.Waident offers comprehensive, proactive cybersecurity...
“Free” Blackberry Enterprise Server
Android, Windows Mobile, and iPhones sync directly with an email server. Blackberry's sync with a Blackberry Enterprise server. With all of the iPhone, windows Mobile, and Android devices being released over the past couple of years, RIM decided to create a free...
Choosing an MSP: No. 2. Strategic Alignment and POV on IT
Does the MSP share our vision for IT and its purpose? Financial viability is critical for an MSP. Prudent financial management ensures that the proper investments are being made in the business and that the MSP can survive the booms and busts of technology trends....
Top 5 Security Things You Should Do Right Now
Dealing with security does not need to be daunting. Good security is really made up of 100 or more little things combined. Even doing a few basic ones can increase your security ten-fold. Here are some simple things you can do right now and you don't even need to hire...
How to Prevent a Ransomware Attack on a Financial Services Firm: Best Practices
Cyber Security Best Practices SUMMARY: Company leaders often think that a cyber attack will never happen to them because their company and its data are of no interest to hackers. This article explains why financial services firms should be concerned about ransomware...
Waident Recognized on the INC. 5000™ List of Fastest Growing Companies second year in a row
2024 is truly a remarkable year for Waident! Not only did we celebrate our 20th anniversary, but we also earned a spot on the prestigious INC. 5000™ list for the second consecutive year. This year, we climbed the ranks from #3076 to #2497, surpassing 579 companies...
How to Protect Small Businesses with the NIST Cyber Security Framework
Use the NIST Framework to better understand, manage, and reduce your cybersecurity risks. Safeguard critical operations and service delivery to prioritize investments and maximize the impact of each dollar spent on cybersecurity.This article explains how to protect...
Security Solutions
Take a strategic and serious approach to your cybersecurityPrudent homeowners lock their homes. Why do so many businesses not do the same with their IT?We hear this refrain often from prospects, "It won't happen to me. I don't have any 'valuable data' that...
7 Things to Know About Cyber-Insurance
Organizations of all sizes and sectors have become increasingly at risk of cybercrime. Our dependence on technology carries growing exposures and liabilities to our businesses. There are many questions about the need for cyber insurance as firms grapple with risks at...
Data Encryption: Best Practices for Business Owners
Waident’s cybersecurity philosophy is simple: Hackers hack easy targets, so the more layers of security an organization puts in place the harder the effort to penetrate and the less attractive a target it becomes.   Encryption is one of those important layers. It is a...
Multiparty videoconferencing on the cheap
We work with many of our clients to help determine the best communication platform to align with their business needs. Whether it be videoconferencing, web collaboration, conference calling bridges, IP phones, desktop video, or anything that helps people and/or teams...
Windows 7 – My Experience
Well I took the plunge and upgraded my Lenovo ThinkPad X61 Tablet laptop to Windows 7. We are a Microsoft partner and have access to the release version of Windows 7 early so I figure why not give it a try since my Vista is so slow that it couldn't be much worse. So I...
Microsoft Office Compatibility Pack
I've written about this before but figured it was worth mentioning again. We have had several clients needing this simple and free program to help with file sharing problems. No need to uninstall Office 2007 so the other users in your office can read and use your...
9 Steps Manufacturers Can Take to Prevent a Ransomware Attack
Attacks on critical suppliers in the gas and food industries have illustrated how hackers attack easy targets, inflict serious pain, and extract easy money from pressured executives. Using what we've learned from recent attacks here are 10 steps manufacturers can take...
Choosing the Right MSP for Your Business
There are probably as many “How to Choose a Managed Service Provider” guides online as there are MSPs. Do you really desire to consume another piece of self-promotional “content”? I’m going to assume that the answer is “No.” Well, my goal is to NOT add to all that...
Curious Tech – April 2023
Here are my favorite items from the recent Consumer Electronic Show (CES), where tech giants and innovators introduce new technology: Â Peddle-powered bike desk You gotta peddle to charge the battery or no power for your laptop...
Interesting Applications (I mean technology) for October
Veebeam - http://www.veebeam.com/OK, it is not a software application, but it is an appealing little device that will allow your laptop to wirelessly transmit its screen and sound to your TV in HD. I’ve actually been looking for such a device for a while to use in...
Did You Know…How To Protect Your Data Before Stepping Away
Task: You have confidential or personal information stored on your computer that you want to keep safe when you step away. You have personal or confidential data up on your screen and you need to step away, but after saving your work you hate to close it all  just to...
Expert View: Navigating AI Compliance and Risks in the Midwest
At Waident, a Chicago-based leader in cybersecurity, we've launched a series of expert interviews to share valuable insights into AI technologies. Today’s guest on "Expert View" is Waident’s Chief Information Security Officer, Patrick Giantomasso. We asked Patrick how...
Your Phishing Guide: How to protect your business
One of the most common ways to breach business systems is phishing. All it takes is one employee, one email, one click and your business is at risk and your data vulnerable. Email phishing is a type of cyber-attack that has been around for many years and continues to...
Curious Tech November
My observation is that, just like the movie industry, tech has shifted towards updating older models rather than being entirely innovative. So, I was happy to have encountered something weird that I would love to have! November list, here we go: ...
Making Smarter Pandemic IT and Cybersecurity Decisions: Avoid Doing Good, Then Getting Hacked
Take your Cybersecurity more seriously now with COVID-19 With the COVID-19 pandemic upon us, life is disrupted, different, and often nothing like what you would have ever expected. Before the pandemic, the decisions you would make with IT and cybersecurity were deemed...
Pull Back the Curtain
You remember that moment in the classic movie The Wizard of Oz when Toto pulls back the curtain on the blustery man behind “the great and powerful Oz”? The moment when you think, really, he’s not so scary after all? Like the Wizard, too often IT companies fuel, rather...