Are you subject to Data Protection laws?

Are you subject to Data Protection laws?

Are you subject to Data Protection laws?This blog introduces a new topic that many may be unaware of: Data Protection laws. These are laws that define fully, or in part, what type of data is covered by government regulations, proscribe general standards for the...
Ransomware Part II

Ransomware Part II

Ransomware Part IIIn our last blog, we explained what ransomware is, and why it can be an especially troublesome virus. Today, let’s look at what you can do to avoid falling victim.Prevention is the best cure. Follow standard “data hygiene” principles that you...
Ransomware part I

Ransomware part I

Ransomware part IThe daily reports of cybercrime are important reminders about the need to protect your business from malicious behavior that could threaten the success of your business. There are so many different things that can attack your computer, steal your...
BYOD=Bring your own disaster?

BYOD=Bring your own disaster?

BYOD=Bring your own disaster?Workplaces today have changed. They extend beyond the working hours, beyond the cubicles. Whether you are commuting to work or even vacationing, chances are you or your employees take a break from the break to reply to those important...
Get smart about smartphones

Get smart about smartphones

Get smart about smartphonesWith flexible working schedules, remote teams and Bring Your Own Device (BYOD) policies in force, it is has become commonplace for employees and business owners alike to use smartphones for work purposes. A quick reply to an email, sharing...