Uncategorized

50% Of All Work from Home Employees Are Ignoring Cybersecurity Protocols

According to a recent study, more than half of work from home employees are putting their organizations at risks for a cybersecurity attack by being lax about security protocols.  With an increase of almost a third of the country working from home due to covid-19, the amount of risk for organizations to suffer an online […]

50% Of All Work from Home Employees Are Ignoring Cybersecurity Protocols Read More »

secure your mobile phone

Tips to Secure your Mobile Phone

Our phones go everywhere with us, even to the bathroom. Let’s not talk about that. Instead, let’s focus for a few minutes on how much data lives on your personal cell phone.

Most people use their phone for much more than simply talking. If you are like me, you use it for banking, web browsing, and just about everything. Outside of work, I use my phone or tablet for 80% of my computer use.

I access social media through my phone, and even do the majority of my online shopping all through my cell phone. Fortunately, I work in IT, so I am exposed daily to the onslaught of security events. Events that are a result of defending against attackers or the threat intelligence sources we subscribe to.

Tips to Secure your Mobile Phone Read More »

90% Of Work From Home Employees Are Confident About Their Employers Security Protocols, But Should They Be?

In a June 2020 research study, IBM found that while the majority of employees said they were confident in their company’s ability to keep information secure, many haven’t been trained on work from home policies. IBM surveyed over 2,000 US based remote workers and found that out of 93% who were confident, 53% were using

90% Of Work From Home Employees Are Confident About Their Employers Security Protocols, But Should They Be? Read More »

Do you have the proper Security Mindset?

“Where there is a will, there is a way” There is debate as to where this quote originated. Was it in 1640 by George Herbert or a did it originate some years later?

While there can be an argument over the origins there can be little argument over the meaning. To put this in its simplest form, if you are determined to accomplish something, then you will.

Hackers and other malicious actors are determined to access data and networks without permission of their respective owners. That is their “business” for lack of a better term. They spend the majority of their time, seeking ways to extract data so they can make a quick profit.

Do you have the proper Security Mindset? Read More »

Kari’s Law What you need to know

[vc_row][vc_column][vc_column_text] Kari’s Law – What you need to know [/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][/vc_column][/vc_row][vc_row css=”.vc_custom_1591905423856{padding-top: 20px !important;padding-bottom: 20px !important;}”][vc_column][vc_column_text] What is Kari’s Law? Kari’s law was unanimously passed by congress on February 16th 2018 and went into effect in 2020. After the tragic death of Kari Hunt in a Texas hotel room, it was discovered that her death may

Kari’s Law What you need to know Read More »

How can a Cloud Phone Service Increase Your Effectiveness and Your Profitability?

If you could wave a magic wand and improve your profitability, would you? If you could immediately increase your effectiveness, would you? What if you could so both at the same time? And what if making the switch was easy? We are pretty sure you answered yes, so let’s talk about how a Cloud based

How can a Cloud Phone Service Increase Your Effectiveness and Your Profitability? Read More »

Calculating the True Cost of Poor Business Communication

How much does poor communication cost a business? Are your remote workers costing your clients? Proper Planning The military has a phrase “Proper Planning Prevents Poor Performance.” This mindset is the basis for their emphasis on training, training and more training. They rely on soldiers who can perform when called upon. Soldiers will tell you

Calculating the True Cost of Poor Business Communication Read More »

Scroll to Top