The Safeguards Rule was originally created for financial institutions. However, the new amendments broaden the definition of financial institutions to include real estate appraisers, car dealerships and payday...
E-mail scams are sent to hundreds of thousands of e-mail addresses with the goal of getting unsuspecting “winners” to provide personal information. This includes things like asking for a Social Security number to...
Chances are you and your employees are taking some well-deserved time off in the next few weeks. As a business owner or executive, you may find it tough to get away because your thoughts turn back to the business.To...
Have you ever had a conversation about a topic, and then later that day you start seeing news, ads or updates about that subject, and said to yourself, “This can’t be a coincidence”?Well, you’re probably right.
Just five or six years ago, VoIP was still considered a “different” type of business phone system. One that wasn’t the norm. But the pandemic changed that way of thinking. Now internet-based phone systems...
Endpoints make up much of a company’s network and IT infrastructure. This is a collection of computers, mobile devices, servers, and smart gadgets. As well as other IoT devices that all connect to the company network.
One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other...
Digital footprints cover today’s modern workplace. Employees begin making these the moment they’re hired. They get a company email address and application logins. They may even update their LinkedIn page...
Microsoft 365 is the most popular of all major office productivity software. It has 48.8% of the global market share, just edging out Google’s apps, by a couple of percentage points.