Data Protection and Bring Your Own Device to Work

Regina Christensen Perspectives Leave a Comment

BYOD refers to a firm’s policy of allowing employees to use their own personal phones, tablets and laptops for all their work applications.This is a pretty common policy, and it has many benefits, but it brings along risks. How are you addressing these risks?   Here are some of the issues raised by BYOD A lost device – If you issue …

Everyday Human Error Can Affect Data Protection

Regina Christensen Perspectives Leave a Comment

Are you under the impression that data loss is all about putting up firewalls to protect against evil cyberattacks? Some of the biggest sources of data loss include sloppiness, human error, and just plain forgetfulness. What are some of the unglamorous things that we do every day that leave us vulnerable?   Passwords Old or easy passwords are a good …

Disaster Recovery Plans: Do You Have One?

Regina Christensen Perspectives Leave a Comment

Disaster recovery and business continuity plans are issues that almost all small businesses fail to think about. More frequently, they decide they haven’t the resources to address such “unthinkables.” If your business was down for 1-2 days or more, what costs would you incur? Lost revenues and lost productivity. These are obvious. You won’t make the money that you would …

Why Small Businesses Shouldn’t Avoid Making Disaster Recovery Plans.

Regina Christensen Perspectives Leave a Comment

Why Small Businesses Shouldn’t Avoid Making Disaster Recovery Plans. Entrepreneurs and small businesses, especially ones that are fairly new, often don’t think about making plans to recover in case of a disaster. However, it is the smallest business that most likely has the fewest resources to fall back on in case of disaster. Why does this happen? It isn’t on …

Seven Best Practice to Protect Yourself from a Phishing Attack

Sebastian Abbinanti Perspectives Leave a Comment

Phishing attacks typically occur through e-mail. The attacker will send you an e-mail with a link that would take you to an authentic-looking site. In a typical phishing attack, the link will take you to a fake site and ask you to login. If you login, the login almost always fails, but not before the attacker has captured your username …

Outsourcing? Really. It’s OK: How it can save time and money

Regina Christensen Perspectives Leave a Comment

Outsourcing? Really. It’s OK: How it can save time and money Almost by definition, small business owners and entrepreneurs cringe at the concept of outsourcing. Those who start their own companies like the control and autonomy it provides them. Unfortunately, that preference for control and autonomy may have some bad side effects when it comes to IT.   Small business …