Blog Archives

Archive for the ‘Blog’ Category

Phone Security Mistakes Your Users Should Stop Now

Whether your company provides phones to staff or supports a Bring Your Own Device (BYOD) policy there are risks associated with phones that access your company’s data. Let’s look at some of the key points surrounding phones in the workplace.

Security configuration

Far too many end users simply do not configure the security settings on their devices.… Read More

Applications Your Business Should Consider Upgrading

While the typical focus on technology upgrades tend to focus on end user workstations –operating systems and productivity apps like Office – it is important to take inventory of all applications within your business each year. . There is value in upgrading legacy applications, particularly in streamlining manual processes and improving outdated workflows that are stuck in the past because of technology limitations.… Read More