What to Ask IT Before Choosing BYOD

BYOD (bring your own device) is great. There is something great about having access to your work information anywhere you are. If a coworker calls you while you’re out with questions, all of your emails and files can be right at your fingertips. Especially if you’re in a position where you are out of the […]

Read the full article

Data Breach–Now What?

Data breaches are no walk in the park. Unfortunately, 43% of companies in 2014 experienced data breaches,  resulting in billions of dollars in losses and recovery expenses. Once it happens, what do you do? Here are some tips: Isolate Your Network Change your account information for all servers and online accounts that contain important and/or […]

Read the full article

Tell-Tale Signs That You’ve Been Hacked

Your computer can be hacked at any time. There are several warning signs that can tell you if someone has unauthorized access to your accounts. Online/Virtual Breaches You’ve been locked out of your account. Emails about changes to your account that you did not authorize. Password changes. Check-ins on different computers. Activity at abnormal times […]

Read the full article