- Best Workplaces
- Corporate Culture
- ISOutsource News
- Managed Services
- Press Release
- Puget Sound Business Journal
- Tech Education
- Tech Tips
- Time and Materials
While you may think your IT and technology requirements decrease without the use of physical office space, the opposite is actually true. What’s the main reason remote work opens your business to cybersecurity attacks? Teams working from home naturally expand the attack environment for hackers given the vulnerable state of home networks, unsecured devices, and...
Is your business protected from security vulnerabilities? Business technology can get complicated quickly. It’s become increasingly more difficult to not only keep your technology organized, but also make sure it is working properly. Similar to owning a car, regular maintenance, notifications of recalls, and repairs are not only recommended but required if you want...
Email may sound old school, but it’s still one of the top communication methods for businesses and individuals. However, it’s also commonly used to spread malware and ransomware. We constantly work to make email security a priority. From phishing scams to malicious downloads, the risks vary greatly. The good thing is there is one ultimate...
Cybersecurity should be a top priority for every business, but we also know that IT budgets often lead to compromises. The problem is hackers constantly look for any vulnerability. We’ve all seen businesses ruined from a cybersecurity attack that could have been prevented. Cybersecurity Statistics Some experts believe the cost of cybercrime attacks will cost...
Traditionally the kinds of virus and malware we see on client computers is fairly benign. While it may disrupt the flow of business, it is generally not destructive. It may require a computer to be formatted and reinstalled, but as a rule of thumb, the irreplaceable data is left in tact. It can be quarantined...
Last week, a group of hackers were all over the web for taking Forbes staff reporter, Andy Greenberg, on a joy ride in a Ford Escape and Toyota Prius (check out the video below). The purpose of this joy ride: To highlight the security vulnerabilities found in many of the most common cars. And the more that are connected, the more this will become a critical issue. An issue that has been mostly ignored by the auto industry.
A lot of talk these days surrounds Mobile Device Management, why you need it and how you can use it to help control your mobile workforce. But did you know that if you work with a recent version of Exchange server, you have some portion of the control for mobile devices that sync to your...
As we continue on our discussions around BYOD, one topic that comes up time and again is the potential issues around these mixed use devices. The mixing of personal and professional data creates some questions and issues that really do bear some analysis and discussion before making any final decisions regarding BYOD in your business.
Part of keeping your device secure is making sure that if it is lost or stolen, other people cannot access your data. Both IOS and Android have built-in device encryption which renders the data on the device useless if the password is unknown. To encrypt an iPhone or iPad (3GS or later): Touch Settings, this...
BYOD. Bring your own disaster? Bring your own disruption? The fact is, when it comes to bring your own device, resistance is futile, and most of the concerns we hear about can be remediated with a little planning. In reality, BYOD is not a technology challenge so much as it is a business question, and I think that fact is overlooked far too often due to the overwhelming noise in the space regarding security fears, viruses, CONTROL, etc.