The big picture on access: Is it time for a policy?
The big picture on access: Is it time for a policy? Autotask offers a set of tools that allow you to ensure optimized collaboration across all levels within and outside the organization. A key part of this collaborat
Read moreHow to Teach Your Family About Internet Safety
(Image Courtesy of SimplyMac) If your children spend a lot of time online, then it is essential to teach your family about internet safety. There are many dangers on the internet, from identity theft to online predators. It c
Read moreTricks that cybercriminals use to hide in your phone
by Denise Giusto Bilić via WeLiveSecurity 16 Mar 2018 – 10:55AM Malware in the official Google store never stops appearing. For cybercriminals, sneaking their malicious applications into the marketplace of genuine apps
Read moreBYOD: What is it, and why do it?
BYOD: What is it, and why do it? BYOD refers to “bring your own device” — a business environment where employees of an organization are permitted to use their own laptops, tablets and other mobile devices in li
Read moreOne-third of organizations sacrifice mobile security for business performance
by Tomáš Foltýn via WeLiveSecurity 27 Feb 2018 – 11:21AM Organizations are aware of the “serious and growing security threat” that mobile devices present in business, and yet many of them admit that they’re not
Read moreUse FSS as a Good Branding Opportunity
Use FSS as a Good Branding Opportunity Are you letting your employees use any file sharing solution they want? Are they collaborating with clients over different platforms? Sharing files via email, text and consumer-
Read more5 Common Security-Related Coding Mistakes
oding and programming have become quite popular today. With many beginners investing in learning and using coding to create apps, websites, and software, most of them rarely regard small yet critical issues on security. This
Read moreLaptop Theft Still The Biggest Threat to Your Data Security
Whenever thinking about the concept of data security, the notion of electronic data theft through hacking always comes to mind. However, breach of physical security is also another vicious risk that has proved to be costly. T
Read moreEnd Version Control Nightmares
End Version Control Nightmares Did you send out a Word document for a client or colleague to review today? If you answered yes, here are four reasons to stop doing this: Time delays – Edits cannot happen in rea
Read moreDoes two-factor identification matter for file sharing?
Does two-factor authentication matter for file sharing? Today, let’s look at two-factor authentication and its value in protecting your file sharing efforts. First, what is it? Two-factor authentication requires tw
Read more
Recent Comments