Blog
Latest Blogs from Mohawk Computers
Thank you for reading.
Your guide to Office 365: Part 1
Your guide to Office 365: Part 1Are you considering investing in Microsoft Office 365? Whether you already use the Microsoft Office Suite and are now thinking of switching, or considering whether to opt for this Microsoft product as your first Office tool, this blog...
Internal threats: A new angle to email security
Internal threats: A new angle to email securityYou know how important your email system is to your business. Not only is email your core communication tool, but also bears a lot of weight from the legal perspective and must be accessible at all times. You have a good...
What to look for an email security solution
What to look for an email security solutionAn important aspect to email security is, of course, deploying a good email security solution. But, with so many available in the market, what should you be looking for when opting for an email security tool? Here are some...
Email safety: Firewalls and antivirus are great
Email safety: Firewalls and antivirus are great, but what about your employeesThe Verizon Data Breach Investigations report states that emails are the primary source of two-thirds of malware. Email is an easy target simply because there is more human touch involved in...
NPO’s and volunteer security nightmare
Not-for-profits have an unusual issue regarding security. Firms that have trained, paid full-time employees have a strong level of control over the actions of their workers. NPOs, however, may rely heavily on volunteers whose time in the office may be minimal and...
Security and your sub-contractors
So you feel relatively comfortable that you have created cyber security around your data and your employees are trained to avoid security errors in their day-to-day business ( a MAJOR source of security breaches, by the way.) However, you may be overlooking one area...