Happy Data Privacy Day!

Data Privacy Day may not be a holiday for your IT Support Professional, however, it is an international holiday dedicated to education about Data Privacy. On this day many private, government and academic Data Privacy and IT Security Professionals get together and...

Internet Browser Security Tips

Internet Browser Security Tips Left unprotected, Internet browsers including: Google Chrome, Microsoft Internet Explorer, Mozilla Firefox, and Apple Safari are increasingly vulnerable to software attacks and may be a place where malicious software, aka Malware can...

Maintaining Network Security

Maintaining Network Security: For many companies, network security is necessary to achieve compliance for PCI, HIPPA and other regulatory requirements. Keeping your computer and wireless network secure is a good policy to protect your company’s critical data. Without...

Bring Your Own Device (BYOD)

Bring Your Own Device (BYOD) Bring your own device (BOYD) is a recent trend where employees use their personal mobile devices including: iPhones, iPads, tablets computers and smartphones to access company information including your network, email, files and critical...

Is Your Network Safer Than The Titanic?

One hundred years ago the ship, called “unsinkable” had its hull breached by an iceberg and caused the death of over 1500 passengers. You may think your network is “invincible” like the Titanic, however, your network security policies may cause vulnerability putting...
Skip to content