Is Your Staff A Cybersecurity Liability?
Don’t assume that cybersecurity is something you can “set and forget” – you need a comprehensive approach to cybersecurity, involving both your technology as well[...]
DHS/FBI Issue Critical Alert: SamSam Ransomware
The FBI and Department of Homeland Security (DHS) have issued a vital ransomware alert for the SamSam ransomware also known as MSIL/Samas.A. The FBI and[...]
Marriott Data Breach: What You Need To Know
Heads up if you’ve stayed or made reservations at a Marriott or Starwood property over the last decade. A major security issue was just announced[...]
Marriott 500 Million Person Data Breach (Questions/Answers)
How Marriott Got Caught In A 500-Million Person Data Breach Were You Affected? (Your Questions Answered) What Do We Need To Know About The Marriott[...]
How Does Using Microsoft Digital Ink Improve Workplace Collaboration?
The integration of the Microsoft (MS) digital ink function and digital pen provides companies with a way to improve collaboration, increase out-the-box creativity, and drive[...]
Running Office 365 or Google Apps?
Guide To Ensure Your Cloud Data Is Properly Backed Up Cloud storage is a relatively new technology that provides access to data on multiple devices[...]
Microsoft Office 365, Data Governance Made Painless
Companies that manage data governance well are in a better position to meet data protection and retention compliance requirements and to accomplish their digital transformation[...]
Which Firewall Is The Right Choice?
As with any security solution, there are a lot of options when it comes to firewalls. What are the pros and cons of each, and[...]
Is Your Company Phone Line A Potential Security Risk?
It seems like every week, a new, high-profile data breach is in the news. Both national and international companies alike can be hacked at any[...]