[vc_row][vc_column][vc_column_text] What do you know about data protection? Even if you’re just a newbie, that’s okay. Today, we’re going to cover a few common questions small business owners often ask. Here they are in random order: 1. What makes data security so...
Data Security
How Secure is that Coffee Shop Connection? A Data Security Discussion
[vc_row][vc_column][vc_column_text] We have all done it. Some time between meetings, stop at Starbucks and get some work done. Check email while you are waiting for your flight at the airport. Or even shelling out the $30 to connect on the plane during that cross...
Mobile Data Security: Forget BYOD – Now the Buzz is BYOx!
[vc_row][vc_column][vc_column_text] We have been discussing BYOD (Bring Your Own Device) for a while now and its impact to your company's data security plans. BYOD is employee-owned devices being brought into a business. Smartphones, tablets, laptops and USB drives...
Top 5 Viruses and How They Have Impacted Data Security
[vc_row][vc_column][vc_column_text] You know what the most amazing part about Heartbleed is? It was around for two years before any news came out about. And it also affected about 2/3 of all internet servers. Doesn’t it seem amazing something like this could happen in...
Internet Explorer Vulnerability Causing Major Data Security Concerns
[vc_row][vc_column][vc_column_text] This article on the latest data security vulnerability is being shared with our blog subscribers from ABC NEWS: "Clicking on one malicious link in Internet Explorer may be all it takes for hackers to hijack your computer, according...
Data Security: What to do About Heartbleed
[vc_row][vc_column][vc_column_text] First thing’s first: make sure you understand what Heartbleed is and is not. It is not a virus – your antivirus software is completely unable to do anything about it. It is no doubt one of the most serious and widespread problems...
Are You Making These 2 Deadly IT Security Mistakes?
[vc_row][vc_column][vc_column_text] Technology takes much of the threat of viruses away. But, it can only go so far. For example, if you visit a website, an ad pops up, and you click the ad, you can still download a virus that wreaks havoc on your computer network. ...
Minimize your Risks for a Security Breach with a Data Protection Plan
[vc_row][vc_column][vc_column_text] Dell Secure Works has a great guide to minimize the impact of a security breach. Their first tip is regarding having a plan in place should a disaster strike. We are sharing this tip and their recommendations with our blog...
6 Essential Data Security Practices Every Business Should Use
[vc_row][vc_column][vc_column_text] Minimum requirements for SMB's to protect their data More than 110 million consumers had their credit card and personal data exposed in the Target data security breach. The whole process traces itself back to an e-mail phishing...
Why Instituting Data Backup Regulations Will Pay Off in the End
[vc_row][vc_column][vc_column_text] SMB's should avoid being penny wise and pound foolish on data security and IT support According to one of the latest studies in the data security field, businesses that decry the cost of following new regulations may well be putting...