by Bob Martin | Jun 12, 2014 | Data Security, SMB Best Practices
We have been discussing BYOD (Bring Your Own Device) for a while now and its impact to your company’s data security plans. BYOD is employee-owned devices being brought into a business. Smartphones, tablets, laptops and USB drives are all examples. Bring your...
by Bob Martin | Jun 10, 2014 | Data Protection, Data Security, Remote Monitoring
You know what the most amazing part about Heartbleed is? It was around for two years before any news came out about. And it also affected about 2/3 of all internet servers. Doesn’t it seem amazing something like this could happen in the internet of 2014? It just goes...
by Bob Martin | Apr 30, 2014 | Data Security, IT security
This article on the latest data security vulnerability is being shared with our blog subscribers from ABC NEWS: “Clicking on one malicious link in Internet Explorer may be all it takes for hackers to hijack your computer, according to warnings issued today by...
by Bob Martin | Apr 16, 2014 | Data Protection, Data Security
First thing’s first: make sure you understand what Heartbleed is and is not. It is not a virus – your antivirus software is completely unable to do anything about it. It is no doubt one of the most serious and widespread problems on the internet. What Heartbleed...
by Bob Martin | Mar 18, 2014 | Data Security
Technology takes much of the threat of viruses away. But, it can only go so far. For example, if you visit a website, an ad pops up, and you click the ad, you can still download a virus that wreaks havoc on your computer network. The repair for that virus can cost...
by Bob Martin | Feb 27, 2014 | Data Recovery, Data Security
Dell Secure Works has a great guide to minimize the impact of a security breach. Their first tip is regarding having a plan in place should a disaster strike. We are sharing this tip and their recommendations with our blog audience as it is a conversation we have...