Sep 27, 2012 | SMB Technology
Beyond Bring Your Own Device (BYOD) Many businesses have adopted an IT policy of Bring Your Own Device (BYOD) to save money and provide employees with the flexibility of staying connected when they travel, work from home and spend time in the field. The BYOD policy...
Sep 12, 2012 | SMB Technology
Internet Browser Security Tips Left unprotected, Internet browsers including: Google Chrome, Microsoft Internet Explorer, Mozilla Firefox, and Apple Safari are increasingly vulnerable to software attacks and may be a place where malicious software, aka Malware can...
Aug 25, 2012 | SMB Technology
Maintaining Network Security: For many companies, network security is necessary to achieve compliance for PCI, HIPPA and other regulatory requirements. Keeping your computer and wireless network secure is a good policy to protect your company’s critical data. Without...
Jul 10, 2012 | SMB Technology
Bring Your Own Device (BYOD) Bring your own device (BOYD) is a recent trend where employees use their personal mobile devices including: iPhones, iPads, tablets computers and smartphones to access company information including your network, email, files and critical...
Jun 9, 2012 | SMB Technology
Data Protection and Password Security Update: LinkedIn On June 7, LinkedIn disclosed that “some LinkedIn member passwords were compromised.” Per LinkedIn disclosures on their blog http://blog.linkedin.com/2012/06/07/taking-steps-to-protect-our-members/ ”LinkedIn...