Blog
Stay up to date in new trends in IT and cyber security. Have an interesting topic you'd like our thoughts on? Get in touch with us today!
How The New FTC Safeguards Rule Will Radically Change How Even Small Businesses Operate
The Safeguards Rule was originally created for financial institutions. However, the new amendments broaden the definition of financial institutions to include real estate appraisers, car dealerships and payday lenders. The FTC goes so far as to include any business that regularly wires money to and from consumers. These organizations are required to develop, implement and maintain a comprehensive security program to keep their customers’ information safe.
Read MoreWinner Winner Chicken Dinner!
E-mail scams are sent to hundreds of thousands of e-mail addresses with the goal of getting unsuspecting “winners” to provide personal information. This includes things like asking for a Social Security number to “verify” your identity before sending you the award you won. Or getting banking information so they can send you your monetary prize.
Read More3 Quick Things To Do Before You Head Out For The Holidays
Chances are you and your employees are taking some well-deserved time off in the next few weeks. As a business owner or executive, you may find it tough to get away because your thoughts turn back to the business.
To help eliminate added stress so you can enjoy time with your family and friends, or sitting on a beach somewhere, here are three quick things to do before you go.
Read MoreAre Your Smart Devices (Siri, Alexa, Google) Eavesdropping On You?
Have you ever had a conversation about a topic, and then later that day you start seeing news, ads or updates about that subject, and said to yourself, “This can’t be a coincidence”?
Well, you’re probably right.
Read MoreWhat Are the Most Helpful VoIP Features for Small Businesses?
Just five or six years ago, VoIP was still considered a “different” type of business phone system. One that wasn’t the norm. But the pandemic changed that way of thinking. Now internet-based phone systems aren’t simply the norm. They’re mandatory for business continuity.
Read MoreSimple Guide to Follow for Better Endpoint Protection
Endpoints make up much of a company’s network and IT infrastructure. This is a collection of computers, mobile devices, servers, and smart gadgets. As well as other IoT devices that all connect to the company network.
Read MoreInsider Threats Are Getting More Dangerous! Here’s How to Stop Them
One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection.
Read MoreChecklist for Better Digital Offboarding of Employees
Digital footprints cover today’s modern workplace. Employees begin making these the moment they’re hired. They get a company email address and application logins. They may even update their LinkedIn page to connect to your company.
Read More7 Pro Tips for Microsoft 365
Microsoft 365 is the most popular of all major office productivity software. It has 48.8% of the global market share, just edging out Google’s apps, by a couple of percentage points.
Read More