Data Leak Prevention – What You Should Know

By supertech01 | Published July 14, 2016

Businesses face many information security risks that must be balanced with the need for information to flow, enabling business productivity. Between mobile devices, remote data centers and cloud-based applications, there’s no longer a well-defined security perimeter. Instead of fixed devices and endpoints, there’s a constant state of flux.… Read More

Mobile Data Breaches – Are You at Risk?

By supertech01 | Published May 25, 2016

Mobile data breaches are far more common than many of us may think. In fact, a recent study by the Ponemon Institute showed that a whopping 67% of organizations were “certain or likely that their organization had a data breach as a result of employees using their mobile devices to access the company’s sensitive and confidential information.” Wow!… Read More

A Look at The Best Antivirus Software

By supertech01 | Published May 11, 2016

When deciding which antivirus software is right for you, you have a wealth of options. First, you need to decide what you’re trying to defend: servers, desktops, mobile devices? For a small- or medium-sized business, antivirus is not just a matter of downloading and installing an application on your computer – you need a strategy.… Read More

Password Managers at a Glance

By supertech01 | Published April 20, 2016

The average user has a ton of username/password combinations floating out in cyberspace. Combine that with passwords used within a small or medium sized business and soon the passwords are overflowing, quick to be forgotten or even worse, ready to fall into the hands of hackers.… Read More

Phone Security Mistakes Your Users Should Stop Now

By supertech01 | Published March 29, 2016

Whether your company provides phones to staff or supports a Bring Your Own Device (BYOD) policy there are risks associated with phones that access your company’s data. Let’s look at some of the key points surrounding phones in the workplace.

Security configuration

Far too many end users simply do not configure the security settings on their devices.… Read More