ONLINE SECURITY – What can you do to become more vigilant? This the first, in series of Blog posts, to help you with identifying the threats and current redirect practices being conducted by online scammers. One of the tactics that online scammers are using to try to fool people into visiting malicious websites is a
Do you remember when smartphones began showing up in the workplace over a decade ago? Whether they were company-provided smartphones or employee-owned smartphones phones, many business users were connecting to the corporate network without a hint of a mobile device management policy in place. This is a very dangerous practice, given that many do not
I talked last week about Mobile Device Management and what it is and why you need a MDM policy for your SMB. In large-scale organizations, implementing Mobile Device Management (MDM) is typically a given. After all, with so many employees using mobile devices that either contain or connect to sources of sensitive information, there needs
Thinking about letting your employees use their own mobile devices on your network? Before you agree to a Bring-Your-Own-Device (BYOD) scheme, please take a look at protecting your company with a Mobile Device Management (MDM) plan. Mobile Device Management is the ability to secure, monitor, manage and support mobile devices – typically involving remote distribution
Don’t fall into the old paradigm of “it will never happen to me.” While there is certainly a chance that you will never have a need for the backups that you make of your files, if something does happen to your computer, you will certainly be glad that you have them. You do not have
SPAM & PHISHING Cybercriminals have become very savvy in their attempts to lure people in and get you to click on an infected link or to open an infected attachment. The email they send can look just like it comes from a financial institution, e-commerce site, government agency or any other service or business.It often
This is an important question to ask when you have a business full of computers, servers and employees. “What will I get with managed services that I couldn’t get with a break-fix solution?” Information Technology (IT) systems are expected to meet high standards of operation, while offering 24/7 availability, security, and performance. In today’s environment,
2015 SMB IT Cyber Security Threats Cyber security experts expect cyber security threats to intensify in 2015, with innovative & complex attacks. Cyber crime is profitable and the risks for the criminals to be caught or punished are still negligible. 2015 is likely to see more copycat crimes as well as increased sophistication in attacks.