Category Archives: Blog
- Home
- Archive by Category "Blog" (Page 9)
Identity Management and You
The second Tuesday of April is designated as Identity Management Day, aimed at promoting security awareness and educating everyone about the risks associated with improperly managing and safeguarding their digital identities. Compromised crede
The Cloud means no more stormy weather
Many small firms are pretty busy handling their own business, and don’t give much thought to what they would do if a natural disaster from a bad snowstorm to much worse hit their physical location and cut power, or physical access to the building. What if the equipment storing all of your
Your front door is talking
If you've been following the news, the Internet of Things is getting increasing attention. You’re probably also thinking this is some Silicon Valley fancy thing that will take years to reach the rest of us. Not really. You probably already have some items of your own tied into the Internet of T
Security and your sub-contractors
So you feel relatively comfortable that you have created cyber security around your data and your employees are trained to avoid security errors in their day-to-day business ( a MAJOR source of security breaches, by the way.) However, you may be overlooking one area where you are exceptiona
Spring is here and with it comes Spring Cleaning
Spring is here and along with springtime comes spring cleaning. But did you know you should also do a digital spring cleaning? Digital spring cleaning is an important part of keeping your digital life secure and organized. It can help ensure that your online presence is up to date and your data is
Cyber Crime and Security for Small Businesses
Did you know the illicit trading of personal data was worth $3.88 billion last year? Cybercrime is a growing industry known for its innovation. It goes far beyond the image many of us have of some hacker kid in his basement. Many who engage in this activity are professionals and work in lar
Password basics people still ignore
You can have all the locks on your data center and have all the network security available, but nothing will keep your data safe if your employees are careless with passwords. Change Passwords - Some security experts recommend that companies change out all passwords every 30 to 9
Stars of the show: Cloud and VOIP
Despite annoying challenges presented by the abrupt shift to the Work-From-Home (WFH) model thanks to the pandemic, there were some tech heroes that saved the day. These two made WFH possible. The cloud The cloud is that platform whereby you outsource your data storage as well as many of your app