Contact Tracing – Personal Information Privacy Concerns
by Jesse Roberts on May 18, 2020 at 2:00 PM
COVID-19 has turned the world upside down. Everyone is feeling the effects of the global pandemic. Governments are still in react mode on how to best deal with a virus that for the short term does not seem to be going away. Without a vaccine in place, the world will need to rely on co …
IT Asset Management – Acquisition of Assets
by Kyle Daun on May 14, 2020 at 1:15 PM
In part one of this IT asset management blog series, we discussed governance policies and procedures. In this second part to the blog series, we will discuss the process for acquisition of assets from reputable and vetted vendors. A lot has happened since part one was written, which a …
Continuous Vulnerability Scanning Within Your Remote Network
by Danielle Corsa on May 7, 2020 at 1:45 PM
By now, you are likely tired of reading similar blogs and watching the same webinars about how the workforce is scrambling to set up secure remote workstations for the employees they have remaining. The words “threat” and “risk” have been used continuously to inspire dread and instill …
Security Concerns to Consider Amid Re-Opening
by CJ Hurd on April 29, 2020 at 1:00 PM
During this unprecedented time in our country, many companies are under strain due to the changing conditions in their workplace. Unemployment rates have now surpassed twenty percent, meaning many companies are now operating with much less staff than they were a couple of months ago.
COVID-19: Is Management Asking the Right Questions?
by Jerry Hughes on April 24, 2020 at 4:00 PM
What if you are the owner or manager of a business in today’s world? A few weeks ago, our world was turned upside down – to say the least. Management’s focus shifted from business as usual to figuring out how to keep employees safe and company doors open for business (in-person or vir …
9 Easy Steps to Create Strong Passwords
by Nicholas Foisy on April 15, 2020 at 4:30 PM
Passwords serve as the gatekeeper to an organization’s data and systems, keeping out unauthorized users and only allowing the right people to enter. The strength of an organization’s passwords can often be the deciding factor to whether they suffer a breach or data disaster.