Whether your company provides phones to staff or supports a Bring Your Own Device (BYOD) policy there are risks associated with phones that access your company’s data. Let’s look at some of the key points surrounding phones in the workplace.
Far too many end users simply do not configure the security settings on their devices.… Read More
While the typical focus on technology upgrades tend to focus on end user workstations –operating systems and productivity apps like Office – it is important to take inventory of all applications within your business each year. . There is value in upgrading legacy applications, particularly in streamlining manual processes and improving outdated workflows that are stuck in the past because of technology limitations.… Read More