4 password policy pitfalls

Security_Dec09_CWhen it comes to the security of the systems and the data in your business, you likely have a good security system in place and your systems are largely secure. That being said, there is one common weak link that all businesses share – the password. If a hacker can crack a password, they will often have full access to your systems.

Three public Wi-Fi security issues

Security_Nov25_CThe Internet has become an integral part of all businesses, with some companies employing remote workers. Many business owners and managers also check their email or connect to office systems while on the road, maybe even connecting to the Internet on the many open or public Wi-Fi networks available.

Three new ways malware infects systems

2013Nov12_Security_CAs a business owner or manager you likely have many different things on your mind at any given time. One issue that many owners fret over is whether their networks, computers and the data stored within are secure enough.

5 tips to minimize malware

Security_Nov05_CCryptoLocker is the latest in a long line of destructive malware programs that have businesses worried. While this is one of the more destructive to come around, you can actually prevent this virus from infecting your systems. One of the best ways to do this is to educate yourself and your employees on steps you can take to reduce the chances of becoming infected.

CryptoLocker – what you need to know

Security_Oct30_CThe security of a business computers and networks is likely top of mind for many business owners. There are constant threats that you need to be aware of, with one of the more prevalent being malware. It seems like nearly every week there is some new security threat that could potentially infect your systems.

5 mobile security questions to answer

Security_Oct16_CThe number of mobile devices used for business purposes is increasing almost exponentially. Because of the higher use, hackers have started to target mobile devices, largely because they can be fairly easy to hack. If you use a mobile device for work, it is a good idea to ensure that it is secure from both external and internal threats.

5 ways to secure personal info

Security_Sep30_CIf you are a small business owner or manager you are likely the person that everyone turns to when things are going well, and not so well. One problem you may face is a security breach, where private information is stolen or leaked. If this were to happen, you will likely be asked questions and maybe even held accountable.

What is managed email security?

Security_Sep16_CThere are many benefits to email. So many in fact, that it has become one of the most essential forms of business communication. While it is certainly valuable, there can be issues regarding security of some systems. For most companies, security is essential and one way to achieve this is by working with a managed email security provider.

Do you ever turn your computer off?

Security_Sep02_CAsk yourself this quick question: At the end of the day, do you turn your computer off or simply stand up and leave? If you were to ask this question to 10 people, you would likely not get all of them to agree on which is the best method. This is actually a common question, but one which is not as simple to answer as you might think.

4 steps to cloud file security

Security_Aug19_CAs we enter the era of cloud computing, it’s a sure thing that many users will be unsure of the security of the system they are using and the documents and files stored within. Truthfully, these systems are fairly secure but not 100% as there is still a chance of information being stolen.