The Risk Tax of Cybersecurity Breaches: Is It Something You’ve Accounted For?

“Did you ever grow anything in the garden of your mind?” It's been many decades since the beloved Mr. Rogers posed that question, and many decades since we each left childhood behind. We got older, we went to college, and a few of us — perhaps you? — found growth in one particular idea:  we

2019-07-23T18:18:24+00:00July 23rd, 2019|Security|

No, you cannot have Admin Access!
(And why this is good IT Policy)

“Carte blanche” is a fun term to say, but toss it into a sentence about your information security and suddenly it foretells some bad repercussions:  “we gave our employees carte blanche access to their workstations, and now we’ve got more viruses than a CDC laboratory.” Sounds bad, doesn’t it? That’s because it really is. Allowing

2019-07-17T22:56:34+00:00July 16th, 2019|Articles|

The Best Browser for Your Business: How to Choose? (Safari & Edge)

It’s hard to imagine a life without web browsers — a time when life once existed, unperturbed, without the whole of humanity’s collective knowledge right at our fingertips. And while it’s unlikely you’ll need to learn how to respoke a wagon wheel, or develop a slightly less stabby cultivar of the prickly pear, modern corporations

2019-06-25T17:51:47+00:00June 25th, 2019|Articles|

The Best Browser for Your Business: How to Choose? (Chrome & Firefox)

It’s hard to imagine a life without web browsers — a time when life once existed, unperturbed, without the whole of humanity’s collective knowledge right at our fingertips. And while it’s unlikely you’ll need to learn how to respoke a wagon wheel, or develop a slightly less stabby cultivar of the prickly pear, modern corporations

2019-06-19T19:20:19+00:00June 19th, 2019|Articles|

App Spotlight: Dropbox

File synchronization and sharing doesn't need much more than a one word explanation:  Dropbox. Though mostly used by smaller teams and consumers, Dropbox recently decided to jump into the ring as a major business and enterprise provider, rapidly increasing its market credibility with both G-Suite and Salesforce integrations. Powering companies as diverse as Hewlett Packard,

2019-06-10T21:02:56+00:00June 10th, 2019|Articles|

What is Social Engineering and How Do I Prevent It?

It's your lucky day! You've just received an email from a Nigerian Prince, and only you can help him claim his lost inheritance! Despite the fact that Nigerian politics take place within a three-branch, federal republic framework modeled after that of the U.S. — complete with a democratically elected head-of-state (a.k.a. President)  — you still

2019-06-04T22:10:02+00:00June 4th, 2019|Articles|