Sagacent's Blog

Sagacent has been serving the San Jose area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Major Reasons Insurance Industries Need a Regular Internal IT Audit

internal audit for insurance industries

Does your insurance company meet its objectives? Is everyone on your team using ethical business and IT practices?

What is the business culture? Are your IT systems working properly? Are things organized as they should be? With almost 6,000 insurance companies in the U.S. in 2016, it is clear that you need a process to review your business and IT practices. The option is to use an internal audit from a third party provider.

Continue reading

Health Care Challenges Medical Offices Face Regarding Regulatory Compliance

healthcare challenges in compliance

Are you doing enough to protect your medical office and patients?

You are not the only medical office leader facing this burning question. Research shows that there are more than a million medical doctors in the United States, all of which have patients and their sensitive data.

As the evolving health care industry continues to impact each of these offices, one thing is for certain, and that is the cybersecurity future remains uncertain.

Continue reading

Why Legal Professionals Are at Risk Without Data Backup

data backup for legal professionals

The most egregious error any lawyer or legal professional can make is failing to have a data backup. Last year, there were more than 1,500 data breaches. These breaches led to the exposure of more than 178 million records. Thus far, this year that number is at 668 data breaches and 22 million exposed records.

Other causes of data loss include theft, hard drive damages, and power failure. Hurricanes and other natural disasters may also destroy your data. In other cases, it is all about fires and accidental liquid spillage.

Continue reading

Investigating the Value of Managed IT Services

  Authentication required.

This is a password protected blog, please kindly enter the password into the password field below to view the blog.

Best Practices to Prevent Health Care Cybersecurity Threats

health care cybersecurity prevention

Did you know that the U.S. medical and health care sector experienced 374 data breaches in 2017?

These breaches represent 23 percent of the total 1,579 data breaches that occurred that year.

Most of these data breaches were caused by internal actors who were mainly driven by financial gain (48 percent), curiosity (31 percent) or convenience (10 percent). Shocking, right?

Continue reading

The 5 Main IT Issues Facing Companies Today

IT issues

"Someone call IT."       

"Have you had IT look at that?"

"Finish your work by noon so IT can perform system upgrades."

If you work in an office, you've heard one or more of the following phrases get thrown around easily. However, do you know what IT workers actually do?

Continue reading

What Does GDPR Mean for Your Business?


Regulations are a fact of life when it comes to doing business. They can impact what you need to keep a record of, how long you need to keep data, and even what type of data you can collect. With the increasing number of cybersecurity threats, businesses need to be able to protect their clients’ information. Also, many countries are now putting protections in place that allow individuals to control the data you collect and how you can use it.

Continue reading

The Biggest Usability Issues with Blockchain

usability problems with blockchain

At the peak of Bitcoin fever in December 2017, there were almost 500,000 transactions a day.

Although cryptocurrencies are the most well known use of Blockchain technology, the potential is vast. But there are some problems with blockchain that are holding the technology back.

Read on as we discuss the current usability problems with blockchain.

Continue reading

Are Your Employees Responsible for Your Cyberattacks?

employees can be responsible for cyberattacks

There is a widely accepted adage in the information security industry - the user is always the weakest link.

It does not matter if your company's security software and protocols are well designed. If your employees are improperly trained, then you are still vulnerable.

Continue reading

Preventing Hacked Passwords: How to Create a Hack-Proof Password

how to create hacked passwords

Your password is the very aspect that separates your private information from other people.

Some of this information is sensitive, such as your bank account information. Other pieces of information are not as sensitive, such as your social media accounts.

However, too many people fail to create powerful passwords. It is understandable why. You tend to forget passwords and are tired of creating new ones so you settle for a simple password.

Continue reading

5 Networking Problems and How to Fix Them

networking problems and how to solve them

Need assistance with your networking problems?

If you are ready to throw your devices out the window, we are here to help. Below, we have put together a list of the most common networking issues and their solutions. Keep reading for details.

Continue reading

What is Cryptojacking? Everything You Need to Know

what is cryptojacking and what do I need to know

In today's digital age, cybersecurity is something that needs to be on everyone's mind. Especially when hackers and criminals are regularly devising newer (and more effective) ways of stealing your data and using your hardware against you.

This threat is especially serious if you're involved in cryptocurrency as criminals have started to turn to cryptojacking to attack your business's security.

Continue reading

Cybersecurity Risks Require Cyber Resilience

cybersecurity risks need cyber resilience

With investigations regarding cyberattacks headlining the news, companies need to be hyperaware of the threats that their companies face. According to a recent study by the Institute of Information Security Professionals (IISP), budgets are not keeping pace with the cyber threats that their systems face daily.

Security spend can be difficult to justify based on external threats and factors alone. Economic impacts for a company can be a restraint. There is also the reality that as companies expand, those new branches bring a host of additional cybersecurity concerns. In light of that, companies are changing from a defensive posture to one that is focused on good detection and response capabilities to address cyberattacks.

Continue reading

Fileless Attacks: What Are They and How Can You Prevent Them?

fileless attacks and how to prevent them

Given that the average business could be looking at a price tag of $3.6 million for a data breach, it's not worth leaving yourself vulnerable. Through lawsuits, a damaged reputation, and the loss of future profit, data breaches can destroy a company's bottom line. To protect your profits and data, you need to take steps to circumvent fileless attacks. What are these attacks and how can you protect yourself?

Here are 4 things you need to know about fileless attacks to help you guard against them.

Continue reading

Downtime Issues: How to Manage and Prevent Unplanned Downtime

unplanned downtime

Research by Google has found that you often have less than 5 seconds to keep mobile users around before they leave your site.

If you're having issues with unplanned downtime, you could be losing countless users out of a lack of faith in your brand. All the work of getting users to show interest in your brand could be lost if they click away after just a few seconds.

If you're looking to lower downtime on your site, follow these 3 rules to keep your customers happy and hanging around longer.

Continue reading

Why Do I Need Penetration Testing?

penetration testing guide for your company

Does your organization need penetration testing?

According to CNBC, 14 million U.S. businesses are at risk of hacker threats. Last year alone, hackers pried into the private vaults of some of the biggest names in the business. Take a look for yourself:


Continue reading

Hard Drive Recovery: How to Get Your Data Back

hard drive recovery

Losing a hard drive is no fun. The fact is hard drives fail all the time. While some are certainly more reliable than others, as it ages your hard drive is likely to fail at some point.

Thankfully, you've got a few options if your hard drive does go down.

Read on as we take a quick look at hard drive recovery and how to get your data back if your drive gives you trouble.

Continue reading

What You Need to Know About Cybersecurity Insurance

cybersecurity insurance policy

The use of technology has made life much easier but has also left us susceptible in new ways. As technology continues to improve, so does the technology of criminals. Even companies that recognize cybersecurity threats can fall victim to the dangers of technology.

Insurance against the unknown is normal and cybersecurity insurance has now become an option. According to the U.S. Department of Homeland Security, "traditional commercial general liability and property insurance policies typically exclude cyber risks, leading to the emergence of cybersecurity insurance as a "stand alone" line of coverage."

Read on to learn what you need to know about protecting your business against these threats.

Continue reading

5 Ways to Prevent Identity Theft For Businesses

how to prevent identity theft online

Did you know that the U.S. Small Business Administration estimates that identity theft costs businesses globally $221 billion a year?

It is an expensive risk for businesses not to be prepared for hackers and identity thieves to strike. Moreover, it can interfere with the trust your consumers have for your business.

Criminals can seize a company's identity and subsequently use it to acquire credit, causing a slew of issues. Then, they will use the credit to make large purchases and damage the company's credit.

To stop these thieves from interfering with your business, here are five ways to prevent identity theft.

Continue reading

The Rise of 5G Technology: What to Expect in 2019

the rise of 5G technology

Are you tired of streaming problems on your laptop and mobile devices? Your network could be configured incorrectly or you might just need more bandwidth.

Internet insiders predict that 5G will be arriving in the United States by the end of 2018 or the beginning of 2019, capable of faster video streaming and lightning-fast upload and download times. New 5G phones are also going to help speed up virtual reality interfaces, work with self-driving cars, and provide faster texting speeds.

Read on to learn what 5G will mean for you and your business.

Continue reading