Information technology is an incredibly important facet to any modern workplace, which means that your team needs to know how to properly handle the IT you have in place. Here are a few key practices that you need to ensure your team is up to speed on: Read More
- Published: 29 May 2020
With so many people working from home due to stay-at-home orders resulting from the COVID-19 pandemic, IT security may not be at the forefront of users’ minds. Unfortunately, scammers and hackers aren’t unemployed during this time and are still causing havoc for businesses of all sizes. Let’s take a look at cybersecurity during COVID-19.
- Published: 11 May 2020
Video conferencing has been one of the surprise winners of the COVID-19 era. As large percentages of people are asked to distance from others, one solution that has been extremely popular is to have meetings over the Internet. While seemingly the whole world is using video conferencing solutions, for the business, there are other considerations
- Published: 04 May 2020
With remote work becoming a popular option amongst businesses nowadays, concerns and considerations should be raised about how secure the networks being used are: namely, the Wi-Fi connections many have in their homes. Just as in the office, it is important that these networks are properly secured for the good of your business.
- Published: 22 Apr 2020
With so many people working from home due to the COVID-19 outbreak, organizational IT security is stretched thin. It is important that you know how to maintain operational integrity while prioritizing security when your whole staff is working from home.
- Published: 16 Mar 2020
Ever since it first popped up in the Wuhan Province of China, COVID-19 (better known as the coronavirus) has created quite a stir—bordering on panic—around the world. Unfortunately, as has been the case many times before, cybercriminals have been using this near panic to support their attacks. Let’s review some of the ways they do
- Published: 06 Mar 2020
The past two decades have generally seen business technology in one of two camps: either IT (information technology), which includes all of a business’ computers, peripherals, and networking equipment, or OT (operational technology), which included everything else. As time has passed, both have advanced, and now both carry the risks once limited to IT. Let’s
- Published: 10 Feb 2020
As of September of 2019, research conducted by Verizon states that almost half of enterprises–half–are willing to sacrifice their mobile security in order to gain “advantages” in speed and productivity. This marks an increase from just 2018, when this metric measured at a still-too-high one-third of enterprises. Of course, such behaviors could bring severe consequences.
- Published: 05 Feb 2020
Your business is bound to collect a sizable cache of data, a significant percentage of which being the kind used to identify someone. This is exactly the kind of data that cybercriminals are looking for, which means it needs to be protected. Here, we’re covering the basics of how you can help secure your data’s
- Published: 31 Jan 2020
With all of the accounts that people have these days, it almost–almost–makes sense that people tend to use passwords that are too short, overly simple, and repeat across multiple accounts. Unfortunately, the only thing this does is to make accounts less secure. As a result, more and more authentication requirements are being put into place