‘Mobile Security’ threatens company data.

'Mobile Security' threatens company data.

According to CIO magazine, a Gartner analyst two years ago pointed to the “growing shortage of cybersecurity resources” and how those impending threats to company networks continue to grow: “Companies are worse off by 100% (with cybersecurity) compared to 10 years ago because the world is more complicated now…Companies have definitely raised the cybersecurity bar, but criminals can keep going higher than the bar.” BYOD brings security risks to company

IT Decision Makers Are Challenged with Mobile Security and Compliance

IT Decision Makers Are Challenged with Mobile Security and Compliance

The digital landscape is alive with change, particularly when it comes to the proliferation of mobile devices (BYOD) in the workplace. The dawning of this phenomenon began as far back as 2009, when the phrase first took hold, becoming, as CIO notes, the ‘New Normal’ in 2013: “CIOs can thank mobile device management vendors for pushing their messages of compliance to business users and, as a result, helping bring IT into

Forbes: Outsourcing IT functions reduces costs and increases productivity.

Forbes: Outsourcing IT functions reduces costs and increases productivity.

The  ‘Forbes Technology Council’  reminds business owners to ask the right questions before making their next IT purchase: Is that hardware, program or application “vital, a luxury or redundant?” Forbes: The under-capitalized SMB faces IT challenges In general, larger companies have the financial where-with-all to maintain an in-house IT department, leaving the under-capitalized SMB-owner in a “struggle to stay afloat” during a downturn.  “Lack of expertise” behind many IT expenditures

A ‘Disaster Recovery’ Plan Begins with a ‘Risk Assessment’.

A 'Disaster Recovery' Plan Begins with a 'Risk Assessment'.

Forbes in a recent overview of business emergency/contingency plans, challenged stakeholders with this question “Is your business prepared for the worst?” Prepare for ‘Disaster Recovery’ For companies operating without a written Disaster Recovery or Business Continuity Plan (BCP), a disruption caused by hardware failures, building fire or flooding can greatly impact efforts to promptly resuming ‘business as usual. While such strategies may be more commonplace in big business, DR plans

Auto Complete Passwords: Safe or Dangerous?

Auto Complete Passwords: Safe or Dangerous?

Auto-complete for passwords is a feature commonly used on browsers today. It is a mechanism that allows usernames and passwords to be automatically entered into a web form. Only around 20% of US internet users have unique passwords for each online account. Many people have to manage dozens of different passwords and see auto-fill as a convenient feature that cuts down on time. Others use a dedicated application to manage