employees

Cyberthreats and the finance sector

The financial sector has long been heavily targeted by cybercriminals. Over the years, the number of attacks that involved extortion,…

7 years ago

Lessons from a disaster recovery plan audit

Why do some companies fail their disaster recovery plan (DPR) audit? Perhaps because they did not get the right information…

7 years ago

Groups, Yammer, and Teams: What are they?

While most Office 365 apps serve a unique purpose, tools like Outlook Groups, Yammer, and Microsoft Teams can all be…

7 years ago

Fight mobile malware with MTD

Cybercriminals will do almost anything to steal your data. One of the easiest ways to do that is exploiting vulnerabilities…

7 years ago

Include VoIP phones in your recovery plan

Businesses that focus heavily on sales and customer service need a reliable, efficient, and effective telecommunications system. If their services…

7 years ago

Save on printing costs with these 5 tips

Managing your print infrastructure efficiently will minimize your IT budget. It sounds impossible, but it can be done. Many small…

7 years ago

Scammers deriving new ways to scam via VoIP

VoIP (Voice over Internet Protocol) makes business communications simple and inexpensive. However, scammers are still finding ways to exploit VoIP,…

7 years ago

Single Sign-On: The key to user management

Making passwords can be tedious. From complexity requirements to minimum lengths, creating a password for each new account brings its…

7 years ago

VPNs: Why you need them

Installing antivirus software and setting strong passwords are no longer considered the bare minimum in cybersecurity. With hackers, third parties,…

7 years ago

How to safeguard PHI

Hospital data breaches are emerging at an alarming rate and show no signs of slowing down in 2019. That’s because…

7 years ago

This website uses cookies.