Fear Not the Cloud, A User’s Guide: Part 1

In general, people fear what they don’t know and this is doubly true for all things related to technology. We get it. Your company’s IT can be daunting. After all, it powers your entire business! If something goes wrong, or even just misbehaves for...

Two-Factor Authentication: What Is It and Why Do You Need It?

If you’ve spent any significant amount of time around technology, or even just poked around on the Internet, you’ve probably already been introduced to the concept of two-factor authentication (a.k.a multi-factor authentication), without realizing...

Extreme Makeover: Network Security Edition

The appeal of makeover and home renovation shows is no doubt the Cinderella transformation that seems to happen overnight to deserving people and places. Where security transformation is concerned, though, the process is rarely an overnight miracle....

Phishing Litmus Test - Do your employees know how to recognize this common e-mail scam?

We have written at length about the Human Firewall and how it can either be your business’ greatest defense or largest liability. So much of the human firewall’s strength depends upon how well employees are trained and empowered to respond to...

If This Happens, Then What? How We Talk with our Clients about Business Continuity

The Business Continuity Institute is kicking off its annual Business Continuity Awareness Week (BCAW) this week, from May 14-18, which aims to help organizations and professionals address emergency preparedness. For this reason, we want to give you...

Subscribe Here For Our Blogs:

Recent Posts

Categories

see all