Blog

Microsoft Teams: The Hub for Teamwork

The way we work is changing. Our work today is much more team-based and collaborative with many more remote workers than previous generations. Because of these changes, we need tools that “work the way we do.” Microsoft Teams is the hub for teamwork, where...

Why Encryption?

Encryption transforms data into a locked format that cannot be read without a key. You can encrypt stored data, data en route for communications and devices that may be used for storage. To unlock encrypted data, you need a key. Encryption is the best defense against...

The Rogue IT Admin

74% of data breaches involved privileged credential abuse.  Centrify Who has access to private data at your business? What policies do you have in place for ensuring accountability? When it comes to user access, every organization needs to: Limit privileged access....

Secure your Mobile Device with these 5 Easy Tips

Most businesses today often require employees to work remotely with mobile phones, tablets and other devices. Many professionals are using these devices at home and connecting to public wifi.   Here’s 5 quick tips for basic protection to keep your mobile...

A Good Password

There are many examples of passwords that have been used that are simply poor choices by computer users. Be diligent and avoid being caught by hackers and scammers. The following passwords have been made up and used often on hackable websites:   111111 12345678...