Things you should never do when creating passwords

Everyone always had advice on how to create a password... but what about how not to create a password? In other words, what are the things you should never do if you want to create and maintain a solid collection of passwords? Here are a few things to keep in mind....

read more

3 Ways to Enforce an Internet Culture at Work

It’s safe to assume that you want your staff to be more productive and efficient when at work. It may also be safe to assume that you’ve seen your employees waste a lot of time on the internet when they should be working instead. They’ll waste time on Facebook, stream...

read more

5 Ways to Keep Your Staff Mobile and Secure

These days, work doesn’t just happen from nine to five. With smartphones and other devices, business happens 24/7. As a boss, it’s important to foster mobility—but, at the same time, boundaries should be established to keep your data as secure as possible. Even if you...

read more

Everyday Habits that Leave You Vulnerable Online

Whether you check social media, read email, or do most anything online, your internet behavior can put you at risk. Hackers and scammers take advantage of your online movements to get your financial data and other sensitive information to use for their gain, at your...

read more

4 easy steps to protect yourself from ransomware

1. Make sure everything is up-to-date and patched to the most recent version Ransomware searches for vulnerabilities in your software and operating system to find a way in and carry out its malicious plans. The WannaCry ransomware discovered a security hole in the...

read more

What to look for in an IT provider

The relationship between technology and running a business has rapidly evolved over the last few years, making it even more important to have a professional IT staff by your side.

read more

Why It’s Important to Have a BYOD Policy

Because mobility and accessibility are crucial to your competitive edge, you don’t have the option to eliminate all those connected devices accessing your company database and sensitive client information. BYOD, or Bring Your Own Device, is a major security concern for businesses of all types …

read more

The Easiest Way to Master Dropbox

As you probably already know, Dropbox has achieved its reputation by providing a simple solution: as long as you have an internet connection, you can get almost instant access to your files on any device, anytime, anywhere. However, even today, some people are still …

read more