5 Ways to Keep Your Information Off the Dark Web

In the last year, you've probably heard nightmares of the dark web and the illegal activities that take place on it. Unfortunately, this is no exaggeration. The dark web is a perilous place where hackers can buy and sell your personal information, like social security numbers, health records, and credit card numbers. What Is the [...]

By |2020-08-10T03:35:35-04:00May 15th, 2018|Security, Business, Enterprise, IT Support|Comments Off on 5 Ways to Keep Your Information Off the Dark Web

How the GDPR Will Affect US Businesses

For nearly a year, everyone has heard about the European Union's General Data Protection Regulation and how it's going to change the way data is collected and protected. Before the May 25th deadline approaches, businesses in the US need to know whether they must comply with GDPR requirements.What Is the GDPR?The European Union (EU) created [...]

By |2020-08-10T02:35:10-04:00March 27th, 2018|Security, Business, Collaboration, Enterprise|Comments Off on How the GDPR Will Affect US Businesses

Should You Let Your Employees Use Their Own Devices for Work?

Many organizations are adopting bring-your-own-device (BYOD) allowing employees to use their smart phones, tablets, and laptops for work. In the last few years, there's been a spike in popularity and it's become the norm for many industries. One of the reasons being ease of implementation as 77% of adults in America already own a [...]

By |2020-08-10T02:15:19-04:00March 21st, 2018|SMB, Business, Security|Comments Off on Should You Let Your Employees Use Their Own Devices for Work?

Reduce Security Breaches with an Internet Usage Policy (IUP)

Why Does Your Organization Need an Internet Usage Policy? Just like many things in life, the Internet is both good and bad. It's great for generating business and getting the job done. But for those who are careless or misuse it, the Internet can be a very, very dangerous tool. To make matters worse, [...]

By |2020-08-10T01:22:43-04:00February 27th, 2018|IT Projects, Business, Collaboration, Security|Comments Off on Reduce Security Breaches with an Internet Usage Policy (IUP)

How to Increase Productivity with a Mobile Phone Policy

Today, there are more distractions than ever thanks to technology and the Internet. While advanced tech makes it faster to complete tasks, all of these diversions can hinder productivity. Do your employees spend excessive amounts of time on their cell phones taking personal phone calls and checking social media? The NY Post reported that [...]

By |2020-06-09T03:00:13-04:00January 23rd, 2018|SMB, Business, Security|Comments Off on How to Increase Productivity with a Mobile Phone Policy

Before You Put That Security System App on Your Phone, Read This!

A cool and innovative feature that is being offered to our clients by their security companies is connecting their security system to an app on key persons’ phones. This sounds great, and is admittedly a useful feature. However, there are huge security risks that must be mitigated before this feature is implemented. Background on [...]

By |2020-06-09T01:37:43-04:00December 6th, 2017|IT Projects, Business, Security|Comments Off on Before You Put That Security System App on Your Phone, Read This!
Go to Top