Staying Connected: Best Practices for Business Travelers

When traveling for business, there are some things about technology we need to talk to you about. It’s because there are big changes in store for you. You’re going places with your phone and laptop now, and that’s going to give hackers plenty of opportunities to get to you:  especially when your guard is down.

2019-10-07T23:58:32+00:00October 7th, 2019|Articles|

Are Cybersecurity Measures Missing From Your Corporate Travel Policy?

Travel and technology are natural companions. And no matter where or why we travel, we’re never more than a few feet from our devices — for better or worse. In many ways, technology is itself a form of travel; or at the very least it’s a world-wide window to humanity writ large. But for all

2019-09-27T21:19:46+00:00September 24th, 2019|Articles|

Proper File Management (a.k.a Please Don’t Save Your Files in the Recycle Bin!)

Does your My Documents folder look like an episode of Hoarders? Have you gotten into squabbles with coworkers about all the icons you have saved to your desktop? It's time we all finally faced the music:  unless you're the Marie Kondo of file management, you're probably a digital packrat. Nearly every corner of our lives

2019-09-10T20:45:03+00:00September 10th, 2019|Articles|

Travel and Tech: What You Need to Know About _FreeAirportWiFi

Maybe you hate the airport, or maybe you love it so much you could watch Spielberg’s THE TERMINAL in the Korean Airlines LAX Lounge and unironically think “hashtag life goals.” (Guilty.) Whatever your feelings are, once you make your way through the living nightmare that is TSA, lollygag in duty free for an hour looking

2019-09-09T18:21:56+00:00September 9th, 2019|Security|

Hardware Lifecycle Management: What’s your plan?

Selective focus of miniature foreman controlling engineer worker to fixed problem and repair Control Processing Unit (CPU), mainboard computer as industry concept. As William Shakespeare once wrote:  “To upgrade, or not to upgrade: that is the question.” Er, hold on… that doesn’t sound right. “To update, or not to…” Nope, that isn't right

2019-08-24T19:35:29+00:00August 24th, 2019|Hardware|

The Risk Tax of Cybersecurity Breaches: Is It Something You’ve Accounted For?

“Did you ever grow anything in the garden of your mind?” It's been many decades since the beloved Mr. Rogers posed that question, and many decades since we each left childhood behind. We got older, we went to college, and a few of us — perhaps you? — found growth in one particular idea:  we

2019-07-23T18:18:24+00:00July 23rd, 2019|Security|

No, you cannot have Admin Access!
(And why this is good IT Policy)

“Carte blanche” is a fun term to say, but toss it into a sentence about your information security and suddenly it foretells some bad repercussions:  “we gave our employees carte blanche access to their workstations, and now we’ve got more viruses than a CDC laboratory.” Sounds bad, doesn’t it? That’s because it really is. Allowing

2019-07-17T22:56:34+00:00July 16th, 2019|Articles|