Compudyne Blog

Compudyne Security Services

CompudyneImage

Introducing Compudyne Security Services

We ensure your company can withstand any IT security threat.

At Compudyne, we continuously evaluate how to best meet the technology needs of our clients. We have recognized that data confidentiality, integrity and availability are under attack more than ever. An event compromising any of these three areas can spark outcomes ranging from minor annoyances to major disasters.

Information security has always been top-of-mind for any of our four pillars: Professional, Managed, Cloud and Network Services. And we’ve never had a dedicated set of resources intent on addressing IT security for our clients…until now. We now provide specific security-focused services for your business.

Meet Our Team

To launch this new service pillar, we pulled in our best IT security experts to serve as dedicated resources to tackle your concerns – and they have a full bench of security strength behind them.

We’d like you to meet Grant Burns and Adam Torgerson.

Grant Burns, Solutions Architect

Grant BurnsWe’re fortunate to have Grant Burns on our team as a solutions architect. Grant has been with the company for 5 years, and he’s based out of our St. Paul office. With more than 18 years of experience in IT, he brings in several industry certifications and a deep knowledge base from working with Microsoft VMware, Cisco and CompTIA.

His consulting experience ranges from the banking industry to education, engineering, energy, finance, food, government, healthcare, manufacturing, media, retail, transportation and more. He’s also been the past presenter at the Minnesota Government IT Symposium.

Adam Torgerson, Director of Hosted/Cloud Services

Adam TorgersonAdam Torgerson is Compudyne’s director of hosted/cloud services and has been actively involved with all security efforts for the organization over the past 6 years. Originally from Duluth, Adam now works out of our St. Paul office.

With over 24 years in the IT world, and a master’s degree in IT leadership with a focus on Information Security – he has a deep passion for cyber security. Adam’s main focus at Compudyne is oversight of the IT security team and the data center and cloud operations. He also chairs Compudyne’s information security governance team and directed and implemented the company’s information technology security policies.

Within our new Security Services Pillar, we’re offering:

Posture Assessment

When it comes to information security, none of us want to appear vulnerable. Once hackers and cyber criminals sense your organization’s IT security weaknesses, they’ll attack in an instant. Compudyne’s new Posture Assessment tracks and analyzes your security tools and processes, compares them to best practices throughout the industry, and provides thorough recommendations of what you can do to shore up your information security.

Vulnerability Scan

If there’s a vulnerability in one of your network devices, our Vulnerability Scans can find it. This service reviews firewalls, routers, servers, switches and applications to identify your weak spots. You’ve invested in network devices to help your business run smoothly, and it’s our job to ensure they’re safe.

Security and Awareness Training

This interactive service ensures your team is ready to face off against the toughest security threats out there. Cybercriminals know that human interaction is the easiest path to accomplishing malicious tasks. End users, people on your team, can often be persuaded by hackers to click a link, open a file, or supply information. By improving awareness, end users are better able to identify suspicious activity and prevent cybersecurity incidents.

Make sure that your organization is protected at all times with Compudyne’s comprehensive and knowledgeable security team. For more information about our Security Pillar, or to schedule a consultation, please Contact Us any time.

Train Your Team to Prevent Phishing Attacks

Screen Shot 2018-07-30 at 1.57.04 PM
What You Need to Know About Phishing

The IT industry is in an uproar over the massive increase in phishing attacks on organizations worldwide. Small businesses, enterprise organizations, even individuals are the victims of these attacks, and the aftermath can be devastating.

You’re almost guaranteed to have an attempted phishing attack on your organization, and if dealt with in the wrong way, it could have a significant impact on your business. Your organization’s reputation, data loss and productivity are at stake – and it’s essential you understand the risks, consider your mitigation options and communicate what you’ve learned to all your team members.

We know there’s a lot at stake. That’s why we encourage you to read this blog and grab a copy of our FREE download – a phishing checklist you can share with your team. If you have any questions on the potential impact to your business, please contact us any time.

What Phishing Means, Exactly

Phishing is simply a type of fraud carried out via email. The victim receives what appears to be a legitimate message from a reputable company or person, asking that some type of action be performed, such as sending money or clicking a link. These cybercriminals are cunning in the way they word their messages, and it can be difficult to determine whether or not the request is authentic – messages often closely mimic the reputable company’s email.

Screen Shot 2018-07-30 at 12.34.37 PM
What we often see is a victim receives an email directing them to click a link or visit an authentication page set up by an attacker. It usually resembles a familiar resource such as Microsoft Outlook Web App or Gmail. Without understanding the threat, victims enter their credentials and the attack becomes a success.

The scammers steal the entered credentials and use them in any way possible. They typically send emails from the victim’s account, download their entire mailbox or log in via VPN, remote desktop or VDI – all possibilities exist since the attacker now has valid credentials.

Screen Shot 2018-07-30 at 12.34.54 PM
Why Spam Filtering and Anti-Virus Software Are Not Enough

As you know, spam filtering and anti-virus software are an important part of any organization’s IT security plan. The problem is that phishing often uses techniques that can evade them both.

It’s important to note that phishing attacks typically don’t include any malware, which is software designed to damage your computer, server or network. That means anti-virus solutions won’t catch the threat, because its purpose is to detect malware only. And spam filtering doesn’t protect against sophisticated phishing attempts, as those messages may come from legitimate email addresses, or trusted IP addresses.

Awareness Training and Exploring Mitigation Options Are Your Best Bets

It’s simple really – increase awareness on your team and reduce the amount of phishing attacks. Train and educate your staff, and they’ll be better able to recognize suspicious emails and web links.

That’s why we’ve developed Compudyne’s Security Services, where we offer tools such as training modules or phishing simulations. We systematically deliver messages to users in your network, and the emails utilize the tactics real attackers use. It’s all for practice, and we won’t gather sensitive information. If a user becomes victim of our staged attack, they’ll be directed to training modules. Reporting is available, and as end users better recognize fraudulent email, the percentage of successful phishing attempts drops significantly over the course of time.

Screen Shot 2018-07-30 at 12.35.09 PM
Another option is an authentication mechanism called Multi-Factor Authentication (MFA). When a user logs into an account, they’ll need something else to verify their identity, such as providing a code sent to email or via text message, or they may need to approve the login via a smartphone app. Our Managed Multi-Factor Authentication Services enable organizations to pick which applications and end users require the additional layer of authentication. It’s one more reputable layer of security, and an essential way to stop cybercriminals in their tracks.

What You Need to Do Next

To learn more about our Security and Awareness Training or Managed Multi-Factor Authentication Services, contact us anytime.

Download our FREE phishing checklist to help train your team.

Download Now

Secrets to an Extra-Secure Office IT Environment

“Companies spend millions of dollars on firewalls, encryption and secure access devices, and it’s money wasted; none of these measures address the weakest link in the security chain.”

– Kevin Mitnick, “The World’s Most Famous Hacker”

The Rise of IT Security

Flashback to February 1995. In one of the first high-profile FBI cases related to computer security, the North Carolina-based hacker Kevin Mitnick was arrested and charged with wire fraud and breaching the secure IT environments of multiple companies including Motorola, Sun Microsystems and Pacific Bell – pointing out how vulnerable even the most secure IT environments are to hackers.

Most IT industry experts, ourselves included, followed along in shock and awe. The hacker spent about five years in prison, including eight months in solitary confinement, and two years in supervised release. Since then, he’s written multiple books and become “The World’s Most Famous Hacker.”

One thing Mitnick taught the industry is that no matter how many IT products, services and devices you purchase – your entire IT environment needs to be secure or your organization is vulnerable to data theft. At Compudyne, we believe bundling these security tools together is the best way to create a secure office IT environment. We stay on top of the industry’s cutting-edge technology to help your information stay secure, and these are some of the most important tools available:

IT Industry’s Top Security Tools

Steps You Must Take Today

We recommend you utilize tools to keep your IT environment secure. That being said, there are still multiple steps you need to take within your organization to protect your data. You can purchase every amazing tool available, but as Mitnick taught us, you’re only as strong as your weakest link.

That’s why we’ve gathered our IT experts and compiled a list of the things you need to do now to protect your business. These tips are easy, convenient and a great way for new businesses to get started with securing their IT environment. They also serve as a great reminder for established businesses seeking to check in on their IT security status. Remember, it’s always a good idea to conduct a security check on a regular basis to ensure your environment is secure and up-to-date. Download our FREE guide to check out our top tips.

Download Compudyne’s 10 Tips for Smart IT Security

Download Now

Compudyne Named to CRN’s 2018 Solution Provider 500 List

St Paul, Minnesota, June 27, 2018 – Compudyne announced today that CRN®, a brand of The Channel Company, has named Compudyne to its 2018 Solution Provider 500 list. The Solution Provider 500 is CRN’s annual ranking of the largest technology integrators, solution providers and IT consultants in North America by revenue.

The Solution Provider 500 is CRN’s predominant channel partner award list, serving as the industry standard for recognition of the most successful solution provider companies in the channel since 1995. The complete list will be published on CRN.com, making it readily available to vendors seeking out top solution providers to partner with.

CRN has also released its 2018 Solution Provider 500: Newcomers list, recognizing 26 companies making their debut in the Solution Provider 500 ranking this year.

“We are very grateful we have been selected to the CRN Solution Provider 500 list,” said Patrick Gibson, Principal and VP of Sales and Marketing of Compudyne. “The recognition is a tribute to the dedication of our employees, long term customers, and our core values which we adhere to in all of our business initiatives.”

“CRN’s Solution Provider 500 list spotlights the North American IT channel partner organizations that have earned the highest revenue over the past year, providing a valuable resource to vendors looking for top solution providers to partner with,” said Bob Skelley, CEO of The Channel Company. “The companies on this year’s list represent an incredible, combined revenue of $320 billion, a sum that attests to their success in staying ahead of rapidly changing market demands. We extend our sincerest congratulations to each of these top-performing solution providers and look forward to their future pursuits and successes.”

The complete 2018 Solution Provider 500 list will be available online at www.crn.com/sp500 and a sample from the list will be featured in the June issue of CRN Magazine.

Follow The Channel Company: Twitter, LinkedIn and Facebook

Tweet This:

@TheChannelCo names @Compudyne to @CRN 2018 SP500 list #CRNSP500 www.crn.com/sp500

About the Channel Company

The Channel Company enables breakthrough IT channel performance with our dominant media, engaging events, expert consulting and education, and innovative marketing services and platforms. As the channel catalyst, we connect and empower technology suppliers, solution providers and end users. Backed by more than 30 years of unequaled channel experience, we draw from our deep knowledge to envision innovative new solutions for ever-evolving challenges in the technology marketplace. www.thechannelco.com

Kim Sparks
The Channel Company
(508) 416-1193
ksparks@thechannelco.com

Contact:
Kaitlyn Vasko
Compudyne
(612) 927-2624
kvasko@compudyne.com

Cisco Live 2018 – Orlando, FL Intent-based networking

IMG_5392Cisco Live, Cisco’s annual conference for customers and partners took place in June, in Orlando, Florida this year.  Along with thousands of attendees, Compudyne took part in the gathering.  The conference includes keynotes from Cisco leadership, breakout sessions covering a myriad of topics, a showroom full of industry solutions, and much more.

The theme for this year’s conference revolved around intent-based networking.  The words ‘Imagine’ and ‘Intuitive’ were on display throughout the Orange County Convention Center.  The meaning and innovation lies in the relationship between business needs and the capabilities of networks today and in the future.

The Network Intuitive

In order to understand the difference between “today’s network” and “tomorrow’s network,” consider an example using a common IT infrastructure:  a datacenter houses servers running business applications; the datacenter connects to core switching, and the core switches feed access layer switches.  The access layer then connects end user devices, printers, and others.  Also consider a firewall, wireless LAN, and a WAN router connecting to branch locations.  Branch locations may have a similar infrastructure and set of end stations.

Given the above infrastructure, imagine a new company-wide initiative that requires the deployment of a solution that includes new devices requiring network connectivity.  These new devices will communicate with a cloud-based application and will require the same security policies, compliance, traffic prioritization, and experience no matter where they are connected. 

IMG_5380

Using “today’s network,” the overall implementation, management, and operation of the new initiative can prove to be a daunting task given the need to configure and validate each network infrastructure component.  Going further, consider the effort required to make an alteration or adapt to changing requirements whether it be due to application requirements or an incident such as a security breach.

Now, imagine the network understanding what type of device has been connected.  The network also understands the device requirements and automatically assigns the correct security policies, access profiles, and bandwidth guarantees.  Performance, adaptability, security, compliance, and reliability can all be improved with “tomorrow’s network,” all based on the underlying business requirements.

Summary

As strange as it may seem, Cisco, a company known for hardware solutions, didn’t hide the fact that the ability to deliver on the future of networking lies in the hands of software developers.  “Speeds and feeds” will still matter, but the real innovation lies in software.  Built on Cisco software solutions such as DNA Center and Identity Services Engine, a demonstration of the “network of tomorrow” was performed during the technology keynote.  The majority of this functionality exists today.  An evolution will not occur overnight, but with proper planning, organizations can be primed to take advantage of these new capabilities and gain a competitive advantage.

Disaster Recovery Solutions - Your Fears vs. the facts

Protecting your technology investment is one of your top priorities. Many business owners live with the constant, nagging fear that something terrible is going to happen and they’ll wind up with a closet full of fried servers, lost data and lost revenue. It’s a legitimate concern. One concern that can be avoided with a Disaster Recovery plan. However, that is not to say that you need a Disaster Recovery plan just because you’re scared. Fear is a natural motivator; however, it’s an emotional response. Deciding on a Disaster Recovery plan should not be an emotional decision. It’s risk management and mitigation; it needs to be based on facts and the type of plan that is going to work best for your specific needs.

At the core, Disaster Recovery is a duplication of data, servers and infrastructure, either on-site or off-site. It enables businesses to get back and up and running as quickly as possible after natural disasters, physical or cyber attacks, or a mistake like accidentally unplugged servers.

Some believe having an on-site backup solution is enough because natural disasters are unlikely in their location, but what happens if the disaster is something like water damage, electrical failure or human error? Simply having equipment on a different shelf doesn’t make it disaster proof. While on-site mirrored equipment is a form of disaster recovery, you need to set your sights higher for greater protection. Off-site replication is key to a business’ ability to bounce back after a disaster. If something catastrophic happens nearby, however unlikely, having secure backup solutions hundreds of miles away can make or break a business. If a power grid goes out on your block, off-site backup will ensure your business remains up and running.

Why Disaster Recovery?

Let’s say that you have data stored on site. Data that is used every day by your employees or your customers. If that data is unavailable, when will you start losing money? 30 seconds? Five minutes? Nobody wants to pay an employee to sit around and do nothing while they wait for the information they need to become available again. Think of all of the products or services your business isn’t delivering to your customers while you are down and consider the lost revenue. What about the relationship you have with your customers? They trust your business and their data to be available – and today’s consumers have very little patience for downtime. If you can’t deliver, they’ll take their business elsewhere. Depending on the size of your business, downtime can cost you thousands of dollars to hundreds of thousands of dollars and beyond. How much are you willing to risk?

The Solution – A Comprehensive Disaster Recovery Plan

A comprehensive plan to restore and recover all aspects of your IT is essential. All variables need to be considered for your internal employees, external employees and customers. Using a company like Compudyne for Disaster Recovery can help determine what you need to maintain your bottom line. Your Disaster Recovery provider should help you find the best solution based on your needs, rather than your fears.

Creating a Disaster Recovery plan makes good business sense. It protects your bottom line and keeps your business agile. Every business is different, so each Disaster Recovery solution should be unique. Trust Compudyne to help you create a plan that works for your business, whether it’s traditional Disaster Recovery, Disaster Recovery as a Service (DRaaS) or somewhere in-between.

Interested in learning more about Compudyne’s DRaaS solutions? Download the DRaaS Overview.

Download Now

Avoid Downtime with Three Simple Strategies

In today’s high-tech business world, downtime is a dirty word. Nobody wants it. Everyone tries their best to avoid it. But still in threatens each and every business without discrimination. If you want to remain competitive, technology must factor into your business plans – but if your systems go down, business comes to a grinding halt. If you and your team can’t access the programs, apps and data you need – whenever you need them – your revenue suffers.

Downtime doesn’t come cheap, either.

We’ve talked about the true cost of downtime before, but it bears repeating. As a business owner, you should have a basic idea how much an outage could cost your business, as well as practical strategies in place to prevent loss of revenue. 

Way back in 2014, Gartner estimated a single minute of downtime to cost, on average, $5,600. For one minute. Four years ago. We can only assume that downtime comes at an even steeper price today. In the inevitable event that your networks or systems experience an outage, how much can your company afford?

We recommend taking a good, hard look at your business to understand the potential impact of an outage. Then we recommend working with your IT solutions partner to develop a strategy that will position your company to avoid downtime at all costs.

These three simple steps are a great starting point:

  1. Establish a Backup Strategy

    We can’t stress strongly enough the importance of your backup strategy. It’s an important component in protecting your critical data in the event of an outage. Think of it as a security net. Backing up your data in a secure data center environment means nothing will fall through the cracks if servers go down, even for a moment.

    Not sure where to start or what your company might need? That’s quite alright. You’re certainly not alone there, and you’ve come to the right place. At Compudyne, we offer a handful of backup options that are suitable for businesses with varying needs. Our Backup Lite service often makes sense for small to medium-sized businesses. It’s a cost-effective solution that is quick and easy to set up. It protects files and folders – as opposed to entire machines and operating systems. Our Backup Pro service, on the other hand, has more robust features for backup and recovery.

  2. Prepare for the worst with Disaster Recovery as a Service

    Backup is often used synonymously with Disaster Recovery, but the two are actually very different. Backup is essentially a copy of your critical data, while Disaster Recovery encompasses a whole lot more. It’s the strategy behind how your company will respond and recover IT environments in the event of a natural or human-caused disaster. Disaster recovery solutions enable your company to bounce back after disaster strikes, with the least possible impact on your operations.

    Disaster Recovery as a Service (DRaaS) is a logical next-step in protecting your business. DRaaS solutions are backed by your IT solutions provider, and often incorporate cloud-based backup and replication services that automatically keep your data and applications accessible and available, no matter what happens. Are you thinking that seamless failback and redundant backup and recovery options sound like a smart choice for your business? We agree.

  3. Work with an IT solutions partner

    There are a lot of options out there that will help protect and secure both your business and your critical data. Avoiding downtime with backup and disaster recovery solutions makes logical and financial sense but deploying a strategy that works for your business and your budget takes a dedicated team of trained IT professionals.

    While your internal IT team is critical to keeping your day-to-day operations running smoothly, developing a custom backup and disaster recovery solution is a significant undertaking. That’s where working with a full-service IT solutions provider you trust is essential.

A Compudyne Success Story: Minimizing Downtime with Disaster Recovery Solutions

In the legal industry, uptime and 24/7 access to applications, programs, file and data can make or break a firm. When a fast-paced, technology-forward legal firm was looking for additional and assurance that their critical data would always be protected, they started a search for an IT solutions provider who could develop a reliable, scalable solution.

After researching many potential partners, they turned to Compudyne for a comprehensive solution that delivered.

Download Now

On Premise vs. Cloud Solutions - How do they Compare?

On Premise vs. Cloud Solutions - How do they stack up?

Business owners across many industries find themselves inundated with information about moving to the cloud. Technology service providers waste no time in explaining the benefits of moving your technology to the cloud – it’s expensive to maintain an on premise infrastructure, keeping up with changing technology trends is a full-time job in and of itself, the cloud offers reliability and security, and many more.

Is moving to the cloud right for your business? Should you invest in a cloud solution or keep your IT infrastructure on premise, where it’s always been? This has been an ongoing debate and the answers are different for each business. There are many factors to consider, like the technical and financial resources available and regulatory requirements specific to your industry.

Moving to the cloud is a smart solution for many businesses. Still, we often hear concerns surrounding how a move to the cloud will impact a business. How do on premise vs. cloud solutions really stack up?

Clearing Up Common Concerns: On Premise vs. Cloud Solutions

  1. Protecting Your Investment in Technology
    As your business competes in today’s tech-forward market, you’ve likely already made significant investments in technology. Many business owners are concerned with wasting their investments and losing access to the programs and data they need for daily operations. Rest assured, with the right IT solutions provider, you’ll be able to create a plan to migrate legacy technology to a cloud solution that provides enhanced privacy, security, and availability.

  2. Retaining Your IT Team
    You’re probably also wondering what happens to your IT team if you decide to move away from on premise infrastructure to a cloud-based solution. You’re not interested in laying off great team members – and you shouldn’t have to change your team at all. In fact, moving your infrastructure to the cloud will make your IT team’s job easier. Cloud solutions eliminate the risk of managing physical hardware in a space that isn’t designed specifically for technology infrastructure, giving your team more time and capacity to focus on managing the environment and keeping your business running smoothly.

  3. Ensuring Data Security
    Data is your business' most valuable asset and should be treated that way. Your data needs to remain confidential and highly available while maintaining integrity and ensuring the sustainability of your business. Securing your data in a reliable, redundant and accessible cloud environment is a fundamental step to getting there. Compudyne’s first-rate data centers are fortified with robust, multi-layer security processes and procedures to ensure your data is safe.  

  4. Meeting Industry Compliance Standards
    Industry regulatory forces put pressure on businesses to implement many layers of security. Moving your technology to Compudyne’s data centers promises peace of mind. We’re committed to ensuring Service Organization Controls (SOC) are met with a SOC2 that helps check the boxes for industry audits. These are the reporting controls that are difficult to meet while having your server environment on premises; as they relate to security, availability, processing integrity, confidentiality and privacy to a system. In our data centers, the stresses surrounding these are highly mitigated during our industry audits.

  5. Managing Technology Costs Wisely
    High-end performance is a must in today’s cloud computing environments; moving to the cloud sometimes sounds expensive and complicated. The reality is, a solid cloud solution almost always ends up cutting costs. You’ll decrease capital expenses because you won’t need to purchase, update or maintain equipment. You’ll also eliminate maintenance costs like cooling and power. Additionally, a fixed monthly bill means you won’t be surprised with unexpected expenses.

    Hardware can be expensive to maintain and will need to be replaced frequently. The same applies with server hardware as today’s resource intensive services and business applications require new and high-performing processing and storage. The costs to replace on premise technology can add up fast. At Compudyne, it’s our job to keep up with technology trends. That’s why we’re always provisioning the latest and greatest high-performing technologies to ensure the best and most secure experience for our customers.

Moving to a cloud-based solution can streamline operations, decrease capital costs and help your business access the full potential of today’s technology. For a closer look at the different solutions available to you, download our On Premise vs. Cloud Solutions Comparison.

Download Now

Firewalls - The Good, The Bad and The Ugly

"I love working on my firewall." 

- No one ever

Untitled design (6).png

Security is essential in today’s business world. There are attacks from the outside via known threats, phishing scams, network hacks, etc. However, your employees are just as big of a risk when they make bad password choices, visit bogus sites or open links they shouldn’t. The security risks can go on and on. The need to protect your business has never been more critical. The best way to be secure is to install and maintain a firewall. It’s a great tool, but it can also be a giant pain in the ass to maintain.

No Pressure…

Ideally, a good firewall will stop the threat before you even know about it. No damage done. When managing IT security, you must keep an eye on everything that is going on. Any change to the firewall can negatively affect the network and the security. Changes to the firewall are frequent, because threats are constantly changing – which is where problems can arise. There are people in their basements who create threats all day long. Some want your money, or confidential information about your clients. Some want to mess with you for fun, just to see if they can. The way threats are created and delivered is constantly changing. So, you can see how a business needs to keep tabs on everything, otherwise network security is at risk. Consistently updating firewall rulesets and keeping up with policies and regulations is a daunting task. If you do something wrong, you risk leaving your business open to an attack. A simple missed rule, an inadvertent back door left open, or not configuring VPNs correctly could cost you serious time and money.  

Fixing the Pain

A firewall constantly needs updates with new information to ensure network security. Luckily, there is a different, and easy, way to do it. At Compudyne, we will install, maintain and monitor your firewall for your business with our Next Generation Firewall Service. You don’t have to touch your firewall, we take care of everything. You can have confidence in your network security at all times. Compudyne provides advanced threat protection, intrusion protection services, application control, data leak scanning, anti-virus, malware, spam-filters and many more services. Next Generation Firewall Service provides a thick layer of defense against a broad array of network-based attacks.  

Prove It

A really fun part of network security is proving that it’s working. In the event of an audit, or a question from management, how easy would it be for you to pull documentation to prove your firewall is working, and your network is safe? Do you, or your team have the documentation immediately available? With Compudyne Next Generation Firewall Service, you receive reports on the activity of your firewall, providing the value of the service. The reporting information is extensive and quickly at your fingertips. You will be amazed at how many threats our service has blocked before you even thought about looking. Auditing is easier, compliance is easier and peace of mind is present.

You simply cannot run a business network without a firewall in place. You may as well open up your bank account, give your clients’ secure information away and put a big bullseye on your office door. If you really like working on your firewall, great, keep up the good work! But chances are, you don’t. It can be intimidating and it’s a lot of pressure that everything will be secure every day. Compudyne provides the expertise to ensure the job is done, and it’s done right – and we back up our promise with documentation and reports. Give us a call, we can remove the uncertainty of network security from your business plan.

Kris Garvey is a Sales Consultant at Compudyne, Inc. in St. Paul, MN.  She can be reached at kgarvey@compudyne.com or 651-203-9300 ext. 645

Proud Partner of the 2018 MSHSL Hockey Tournament

We live for this.

You would not believe the excitement that permeates the Compudyne office during hockey season. Some companies go all out for the football post-season. Others can’t get enough of March Madness. For Compudyne, we live and breathe hockey.

Image-2.png

That’s why we get such a kick out of partnering with Hubbard Broadcasting and supporting the MN State Hockey Tournament every year. We love seeing how hard the student athletes work to achieve their dreams. We love the passion, the sportsmanship, the hair. We love seeing their drive. It makes us excited for the next generation of emerging young leaders. They’re incredible, inspirational and plain old fun.

When you’re watching the tournament this year, be on the lookout for the Compudyne logo around the arena. And don’t miss our commercial spot, either. We had a lot of fun putting it together and we’re excited to share it with all of you. Compudyne is proud to support this tournament, and to share our passions with our customers.

We’re looking forward to the girls’ tournament facing off this week, and the boys’ tournament starting up March 7th. So, in the moments between client meetings and providing secure, reliable and strategic IT solutions for our business partners, we’ll be checking the scores, comparing our predictions and celebrating along with the rest of the state.

Let’s play some hockey!