Symposit-HumanLink-CASRA I/ITSEC Trade Show Partnership
Visit the HumanLink/Symposit Booth #2673 at the Interservice/Industry Training, Simulation and Education Conference (I/ITSEC), November 29-December 3, 2021 Together with our global partner CASRA visitors can experience innovations to security training and screening first-hand. There will be Demos, Competitions and prizes for those who locate the threat first via XRT4. Prizes include special offer XRT4 […]
Apple Scam Alert!
Apple Scam Alert: There is a phishing scam that has been out for a while which actually spoofs Apple Inc. and it is designed to hoodwink you. It comes in the form of a phone call and/or email. It can start with an ‘automated’ phone call that display’s Apple’s logo, address and real phone number, warning about […]
ONLINE SECURITY – What can you do to become more vigilant?
ONLINE SECURITY – What can you do to become more vigilant? This the first, in series of Blog posts, to help you with identifying the threats and current redirect practices being conducted by online scammers. One of the tactics that online scammers are using to try to fool people into visiting malicious websites is a […]
Mobile Device Management – Are you ready?
Do you remember when smartphones began showing up in the workplace over a decade ago? Whether they were company-provided smartphones or employee-owned smartphones phones, many business users were connecting to the corporate network without a hint of a mobile device management policy in place. This is a very dangerous practice, given that many do not […]
Mobile Device Management (MDM) PT. II
I talked last week about Mobile Device Management and what it is and why you need a MDM policy for your SMB. In large-scale organizations, implementing Mobile Device Management (MDM) is typically a given. After all, with so many employees using mobile devices that either contain or connect to sources of sensitive information, there needs […]
What is Mobile Device Management?
Thinking about letting your employees use their own mobile devices on your network? Before you agree to a Bring-Your-Own-Device (BYOD) scheme, please take a look at protecting your company with a Mobile Device Management (MDM) plan. Mobile Device Management is the ability to secure, monitor, manage and support mobile devices – typically involving remote distribution […]
Have you backed up your data lately?
Don’t fall into the old paradigm of “it will never happen to me.” While there is certainly a chance that you will never have a need for the backups that you make of your files, if something does happen to your computer, you will certainly be glad that you have them. You do not have […]
How to stay safe online
SPAM & PHISHING Cybercriminals have become very savvy in their attempts to lure people in and get you to click on an infected link or to open an infected attachment. The email they send can look just like it comes from a financial institution, e-commerce site, government agency or any other service or business.It often […]
Managed Services–What is it and why do I need this for my organization?
This is an important question to ask when you have a business full of computers, servers and employees. “What will I get with managed services that I couldn’t get with a break-fix solution?” Information Technology (IT) systems are expected to meet high standards of operation, while offering 24/7 availability, security, and performance. In today’s environment, […]
SMB (small-to-medium businesses) Cyber Security Threats
2015 SMB IT Cyber Security Threats Cyber security experts expect cyber security threats to intensify in 2015, with innovative & complex attacks. Cyber crime is profitable and the risks for the criminals to be caught or punished are still negligible. 2015 is likely to see more copycat crimes as well as increased sophistication in attacks. […]