The windows rattled from the gusts of autumn wind.
“Just need to finish inputting the donations from today, then it’s me and my couch,” she sighed to herself.
Earlier today, she hosted a fundraising event for the dog shelter she founded. The event was a success with an outpouring of community support and all funding goals reached. But the work doesn’t end with the event. Sitting at her desk, she painstakingly ensured the numbers were accurate and accounted for in Quickbooks.
Having sent the rest of her team home, the office felt cold and dark. The weather didn’t help. She couldn’t believe how quickly the storm rolled in after the sun set. She got up to turn on more lights, nervous from the shadows in the hall. Once she was on her feet, she heard a tapping on the window. Sprinting to the lightswitch, she turned to find it was just a broken tree branch agitated by the wind. Just then, her forgotten phone in her pocket buzzed and sent a shock through her limbs.
“Get a hold of yourself,” she thought and pulled out her phone. It was one of the volunteers from earlier today. The photographer who donated a day of work, for which she was eternally grateful. These pictures will be great for social media and the new website they are working on.
In her excitement, she sent the link to her laptop to get a good look at the photos. She failed to notice the misspelling of Google and the lack of an SSL.
Brimming with excitement, she sat at her desk to see that the page hadn’t loaded a drive full of dog photos at all. It contained nothing but in the top right corner, the download manager activated. Before she could press cancel, the download completed and a rogue program began to run. Remembering the account information and passwords she has stored on her computer, the panic began to set in and her heart raced.
Just then, an email notification dinged her phone. It was from CMIT Solutions I-270 corridor, her IT support and security monitoring partner, notifying her of a threat detection. Her phone began to vibrate with a CMIT Solutions I-270 Corridor team member calling to mediate the threat.
Her heart rate decreased and within 20 minutes the threat had been neutralized and sensitive information was now safe. Without CMIT Solutions I-270 Corridor, her foundation could’ve been in ruins and all she worked for, gone. The scariest story she could imagine.
With the wind fading and the rain gone, she finished her evening and packed her laptop to head home.
“Time to put on my favorite scary movie and relax,” she said, locking the door. With her data and privacy safe, she went home without a worry on her mind.
Get your data in a safe space today with CMIT I-270 Corridor!
