BYOD

BYOD (Bring Your Own Device) is a great opportunity and challenge for businesses. With the right approach to identifying BYOD risks and developing effective BYOD policies, you can take advantage of BYOD without adding significant risks. A BYOD security policy is required if the company allows employees to use their computing devices for work, such as smartphones, tablets, and notebooks. Initially, employees at work used only equipment provided by the company. Today, smartphones and tablets are widespread in the consumer market, with almost all employees working on devices…

0 Comments

Technology Onboarding & Offboarding

Are you currently using an Onboarding/Offboarding checklist as part of your new employment or termination procedure? These defined steps are very important to the business and the employee. Here are some reasons why:  Onboarding  A new employee understands that the first day of a new job is usually just a stack of paperwork and training. In fact, most people do not even get to perform the work they were hired to do on Day 1. It can be very discouraging for the new hire and may give a perplexed…

0 Comments

Email Security

In our connected world, the web is full of people trying to take advantage of unsuspecting users. Several years ago, you’d see emails requesting help from a banished prince so he can access his wealthy bank account and send you back a million dollars for your assistance, and it was a little easier to call their bluff. Now you don't even need to respond to a phishing attempt for them to start an attack on your computer. Phishers, people trying to attack your machine, can disguise themselves as your supervisor or a commonly used application…

0 Comments

End of content

No more pages to load