Blog

The Rogue IT Admin

74% of data breaches involved privileged credential abuse.  Centrify Who has access to private data at your business? What policies do you have in place for ensuring accountability? When it comes to user access, every organization needs to: Limit privileged access....

Secure your Mobile Device with these 5 Easy Tips

Most businesses today often require employees to work remotely with mobile phones, tablets and other devices. Many professionals are using these devices at home and connecting to public wifi.   Here’s 5 quick tips for basic protection to keep your mobile...

A Good Password

There are many examples of passwords that have been used that are simply poor choices by computer users. Be diligent and avoid being caught by hackers and scammers. The following passwords have been made up and used often on hackable websites:   111111 12345678...