Blog
Should You Provide Staff with iPhones or Androids?
You may decide to have a fleet of smartphones that are owned and managed by your organization. The benefits of control and centralized management speak for themselves with the cost weighing on the other side of the decision. If… Read more »
Companies Need to Train Staff in Cybersecurity
Cyber-attacks continue to rise and remain a headache for organizations across the globe. Vigilance in combatting these attacks are boosted significantly by simply educating your staff on an ongoing basis. In a recent survey by Dell, companies with a security… Read more »
Protecting Payment Card Data: What is New in PCI-DSS
Companies that process credit and debit cards for purchases of goods and services may decide there is value in storing those card details per customer for future purchases and history. That decision should not come lightly as it requires… Read more »
Custom Application Development: Why Should You Build?
Companies that look to deploy a software application, internally or for customers, are often presented with a major decision from the outset. Should we use an off-the-shelf package and try to configure it for our needs, or should we construct… Read more »
Ransomware Remains on Top of Security Threats List
The IT community and its leaders must continue to focus like a laser beam on the user community when it comes to assessing their vulnerabilities to threats of data breach. The user is still the weakest link in the chain…. Read more »