Managing Risks: Small firms need to wake up

Managing Risks: Small firms need to wake up

You may not think too much about serious disasters. Most of us focus on the day-to-day chores of running our businesses and keeping revenues up. However, there are long-term planning concerns that many firms avoid. Those concerns are managing the risk to your business...
BYOD: Bring Your Own Device-Placing limits

BYOD: Bring Your Own Device-Placing limits

Our recent blog talked about the data security concerns that BYOD can bring to your workplace. However, there is another factor that needs consideration before adopting BYOD. How much Bring Your Own can your IT department support? Supporting too many different...
Multi-factor Authentication Demystified

Multi-factor Authentication Demystified

You have probably come across the term multi-factor authentication of late. It is an IT buzzword today and is fast becoming one of the best practices of cybersecurity. What is Multi-factor Authentication? As fancy as the term sounds, multi-factor authentication (MFA)...
Dark web monitoring: What you need to know

Dark web monitoring: What you need to know

The dark web is essentially a marketplace for cybercriminals. If your data has been compromised, the dark web is the place where it is traded. It could be sold to miscreants who can later hack into your system. As a result, they can extort money from you to prevent a...
BYOD can have some downsides

BYOD can have some downsides

Employers know that employees prefer BYOD (bring your own device) policies and that they can increase productivity. However, BYOD can have some downsides. The most prominent concern among those who have to address the BYOD issue is an increase in data security risk....