Ctrl+Alt+Delete 2020
Thoughts on 2020 from company President, Kevin Kelly.
It's Time To Secure Your Remote Workforce (Again)
When a company transitions to a remote workforce, there are several requirements to ensure a successful transition. While many of us experienced this during the first round of lock-downs, most companies needed to take a "just get it done” approach, and may not have had the opportunity to slow down and put security first.
What’s the Difference Between Anti-Spam and Anti-Virus Protection?
With a reported increase in malware attacks since the start of the pandemic, it is critical to safeguard against breaches.
Top 12 Most Common Phishing Subject Lines
A typical spear-phishing email attempt will use vague but recognizable language in the email subject line to make it appear more realistic and increase open rates. For example, if the email in questions was supposed to imitate an internal communication between co-workers, then a simple and informal message such as "are you at your desk?" may be used as the subject.
How To Use Call Reporting to Track WFH Productivity
Intelligent cloud-based phone systems have many advantages, one of which is the ability to get more granular insight into call activity and do so on a real-time basis.
What in the World is 'Smishing'?
It was inevitable that cyber criminals would begin to target mobile devices to access company data and text messaging is the obvious gateway to entry.
BYOD vs. Company Owned: How To Choose A Device Policy
Considering the current stress on the supply chain of Laptops and devices, there has never been a better time to re-evaluate your company's policy on devices. The two options that most will consider are "bring-your-own-device" or providing a standardized device that is paid for by the company.
4.5 Reasons Why You Shouldn’t Trust Free Antivirus
Just because there's preloaded antivirus software on a machine, doesn't mean that it is the right solution to keep your business secure. In some cases, it may even be leaking data intentionally.