How to avoid falling victim to ransomware
How to avoid falling victim to ransomwareWe hear routinely in the news that a major corporation or government agency has had its data integrity compromised, with millions of pieces of...
Read MoreHow to avoid falling victim to ransomwareWe hear routinely in the news that a major corporation or government agency has had its data integrity compromised, with millions of pieces of...
Read MoreVoIP facilitates working from home. So What is VoIP?What is VoIP? Voice over Internet Protocol takes us away from the traditional office PBX, the on-location physical equipment that provides voice...
Read MoreRansomware attacks just keep increasing: Vet practices aren’t immuneThis cyberattack scheme isn't new, but it has become increasingly common over the past several years. Many of the viruses lurking out...
Read MoreBYOD and Federal Wage laws: Look out!As most everyone knows, Bring Your Own Device (BYOD) is an approach wherein organizations allow their employees to use their own smartphones and other...
Read MoreThe inevitable increase in Working from Home and the move to VoIPAs you are surely aware, working from home (WFH) has been the primary way that white collar, office-based jobs...
Read MoreThree responses after a Ransomware attackIf you are unfortunate enough to be the victim of a ransomware attack, there are basically only three options open to you. Ransomware is a...
Read MoreBYOD goes far beyond IT questions.Most often we view BYOD policies as something initiated and overseen by IT. But that misses the broad-ranging impact of BYOD across several other functions...
Read MoreBYOD and Reimbursement PoliciesThere is a great deal of discussion about the advantages and disadvantages of the policy of allowing employees to use their own mobile devices, primarily smartphones, instead...
Read MoreBYOD: The fine print mattersBYOD is the acronym for Bring Your Own Device to Work where “device” can refer to a laptop, tablet, or smartphone. Most frequently, however, the...
Read MoreThere is more to it than installing some antivirus and buying a firewall. Ready to get into the weeds? IT and network security is often focused on keeping intruders out in...
Read More