[vc_row][vc_column][vc_column_text] We have all done it. Some time between meetings, stop at Starbucks and get some work done. Check email while you are waiting for your flight at the airport. Or even shelling out the $30 to connect on the plane during that cross...
Data Security
Mobile Data Security: Forget BYOD – Now the Buzz is BYOx!
[vc_row][vc_column][vc_column_text] We have been discussing BYOD (Bring Your Own Device) for a while now and its impact to your company's data security plans. BYOD is employee-owned devices being brought into a business. Smartphones, tablets, laptops and USB drives...
Top 5 Viruses and How They Have Impacted Data Security
[vc_row][vc_column][vc_column_text] You know what the most amazing part about Heartbleed is? It was around for two years before any news came out about. And it also affected about 2/3 of all internet servers. Doesn’t it seem amazing something like this could happen in...
Internet Explorer Vulnerability Causing Major Data Security Concerns
[vc_row][vc_column][vc_column_text] This article on the latest data security vulnerability is being shared with our blog subscribers from ABC NEWS: "Clicking on one malicious link in Internet Explorer may be all it takes for hackers to hijack your computer, according...
Data Security: What to do About Heartbleed
[vc_row][vc_column][vc_column_text] First thing’s first: make sure you understand what Heartbleed is and is not. It is not a virus – your antivirus software is completely unable to do anything about it. It is no doubt one of the most serious and widespread problems...
Are You Making These 2 Deadly IT Security Mistakes?
[vc_row][vc_column][vc_column_text] Technology takes much of the threat of viruses away. But, it can only go so far. For example, if you visit a website, an ad pops up, and you click the ad, you can still download a virus that wreaks havoc on your computer network. ...
Minimize your Risks for a Security Breach with a Data Protection Plan
[vc_row][vc_column][vc_column_text] Dell Secure Works has a great guide to minimize the impact of a security breach. Their first tip is regarding having a plan in place should a disaster strike. We are sharing this tip and their recommendations with our blog...
6 Essential Data Security Practices Every Business Should Use
[vc_row][vc_column][vc_column_text] Minimum requirements for SMB's to protect their data More than 110 million consumers had their credit card and personal data exposed in the Target data security breach. The whole process traces itself back to an e-mail phishing...
Why Instituting Data Backup Regulations Will Pay Off in the End
[vc_row][vc_column][vc_column_text] SMB's should avoid being penny wise and pound foolish on data security and IT support According to one of the latest studies in the data security field, businesses that decry the cost of following new regulations may well be putting...
IT Outsourcing Proves Invaluable for Law Firms
[vc_row][vc_column][vc_column_text] Keeping IT needs in-house can lead to a number of unfortunate situations It’s a well-known axiom of business that nobody is an expert at everything, a principle that applies not just to individual employees but also to entire...