Blog

Why Encryption?

Encryption transforms data into a locked format that cannot be read without a key. You can encrypt stored data, data en route for communications and devices that may be used for storage. To unlock encrypted data, you need a key. Encryption is the best defense against...

The Rogue IT Admin

74% of data breaches involved privileged credential abuse.  Centrify Who has access to private data at your business? What policies do you have in place for ensuring accountability? When it comes to user access, every organization needs to: Limit privileged access....

Secure your Mobile Device with these 5 Easy Tips

Most businesses today often require employees to work remotely with mobile phones, tablets and other devices. Many professionals are using these devices at home and connecting to public wifi.   Here’s 5 quick tips for basic protection to keep your mobile...

A Good Password

There are many examples of passwords that have been used that are simply poor choices by computer users. Be diligent and avoid being caught by hackers and scammers. The following passwords have been made up and used often on hackable websites:   111111 12345678...

IE is not a Browser

Internet Explorer (IE) has been a long-standing staple of the work computer. It is used to do everything from accessing internal tools, to casual web browsing during coffee breaks. And, while it was once good and handy, time has not been kind to the little ‘e’ — it has become a very big risk.