One of my favorite web comics, XKCD explains password strength…
You’ve heard it before, but I’ll say it here again. The web, including your data, is under constant attack. Everywhere and all the time. Some of the attacks are automated and come from “robots,” while others are actual humans trying to break in. Failing to utilize two-factor authentication, whereever and whenever possible, will leave you exposed.
I talked last week about Mobile Device Management and what it is and why you need a MDM policy for your SMB. In large-scale organizations, implementing Mobile Device Management (MDM) is typically a given. After all, with so many employees using mobile devices that either contain or connect to sources of sensitive information, there needs
Thinking about letting your employees use their own mobile devices on your network? Before you agree to a Bring-Your-Own-Device (BYOD) scheme, please take a look at protecting your company with a Mobile Device Management (MDM) plan. Mobile Device Management is the ability to secure, monitor, manage and support mobile devices – typically involving remote distribution
Don’t fall into the old paradigm of “it will never happen to me.” While there is certainly a chance that you will never have a need for the backups that you make of your files, if something does happen to your computer, you will certainly be glad that you have them. You do not have
SPAM & PHISHING Cybercriminals have become very savvy in their attempts to lure people in and get you to click on an infected link or to open an infected attachment. The email they send can look just like it comes from a financial institution, e-commerce site, government agency or any other service or business.It often
This is an important question to ask when you have a business full of computers, servers and employees. “What will I get with managed services that I couldn’t get with a break-fix solution?” Information Technology (IT) systems are expected to meet high standards of operation, while offering 24/7 availability, security, and performance. In today’s environment,
2015 SMB IT Cyber Security Threats Cyber security experts expect cyber security threats to intensify in 2015, with innovative & complex attacks. Cyber crime is profitable and the risks for the criminals to be caught or punished are still negligible. 2015 is likely to see more copycat crimes as well as increased sophistication in attacks.
Symposit LLC is pleased to announce that it has recently received SWaM Certification from the Commonwealth of Virginia. The Small, Women-owned, and Minority-owned Business (SWaM) certification program is a state program of the Commonwealth of Virginia. The purpose is to enhance procurement opportunities for SWaM businesses participating in state-funded projects. In 2006, Governor Tim Kaine set
Symposit LLC is pleased and excited to announce that we have now become a Cisco Meraki Elevate Partner! If you don’t know what Cisco Meraki is, it’s the leading edge, next generation technology in the cloud networking arena. Meraki makes enterprise networking administration, security and management a snap, since everything can be centrally managed over