The GDPR will go into effect in less than 20 days. We have put together 20 quick facts that will guide you in the right direction to prepare you for GDPR. Check out this list.
Continue readingThe GDPR will go into effect in less than 20 days. We have put together 20 quick facts that will guide you in the right direction to prepare you for GDPR. Check out this list.
Continue readingIt is impossible and illegal to stop employees from using social networking sites 24/7 and even if it were legal it wouldn’t be a good idea as it could easily alienate your employees. The best course of action is to educate your employees about the best way to stay safe on social networks. Below is […]
Continue readingWith too many routine tasks, such as patch management and network auditing, there’s little time left for IT teams to lead in innovation. Fortunately, automation tools come to the rescue.
Continue readingWith the workforce going mobile, connecting with on-site Exchange servers became a challenge. This new protocol provides a secure and reliable solution.
Continue readingWith all the recent major Microsoft launches, one new technology went almost unnoticed. The Defender ATP security service offers advanced protection against cyber-attacks based on big data analysis.
Continue readingOne of the most reliable ways to achieve secure logins is multi-factor authentication, but too many people are still avoiding it. And for no clear reason, since the new solutions on the market are making it simpler and easier to use.
Continue readingA year has passed, and the new, improved Microsoft Windows is here, bringing new features and an old dilemma: is it wise to upgrade your PC or tablet to the latest version of Windows immediately? Here’s a list of features that would make you think twice about your decision.
Continue readingAn independent study commissioned by GFI Software examining the business and societal impacts of cyber security issues, reveals stark concerns over the increasing personal and business risks posed by cybercrime and the growing likelihood that cybercrime acts will escalate to physical retaliation.
Continue readingWelcome to part two of our three-part series on authentication. In this post we will review some of those that are used in networks.
Continue readingThe details were revealed this week in a report from Kaspersky Labs, which first got involved in tracking down how the attacks were happening back in 2013 when an automatic teller machine in Kiev was compromised in a high profile incident in which the ATM began to dispense money without any user action.
Continue reading