Businesses need to expect that one in five of their employees to leave in an average year. You can be doing all you can to retain your people, but what are you doing to protect company data when some do leave? Our eBook, 8 Steps Protect Your Company Data when People Leave explores:
Risks to sensitive information when people leave your business.
Best practices to protect your business data
Ways an IT service provider can help secure your business data.
Our latest eBook shares strategies to help fight employee turnover in the first place and also .
Whether you work remotely or in an office, there is a fine line between personal and work tasks on a company computer. Like a lot of people that are in front of a computer for most of their work day, it is not unusual to get attached to your desktop laptop or PC. Continue reading →
All of us like to think that we are unique and that thinking extends to our passwords too, right? We are special and distinct, and no one could guess our specific combination of letters, numbers and symbols. Well, did you know that it is very easy for computers to very quickly determine passwords. So, using a password manager is a great move, as you can securely store your passwords in an easily retrievable way. But is your master password for your password manager secure, original and long enough? Continue reading →
Most people see reports on ransomware hitting government departments, hospitals and other big name companies. As such they think it won’t happen to them as the bad guys are just targeting the larger companies and organisations, but ransomware can just as easily infect your own computer. Continue reading →
In the internet browser market, Microsoft has made enormous strides since discontinuing the much-maligned Internet Explorer. Microsoft Edge is the successor to Internet Explorer and arguably provides the best web experience for business users. Continue reading →
Microsoft recently introduced Windows 11 as the company’s latest operating system. When compared to Windows 10, this new OS has variety of features that can increase your productivity and provide a better user experience. Continue reading →
Like me, you are probably overwhelmed with the number of emails you receive each day and you could be excused for not looking at them all closely. But not taking this seriously can be a huge risk to your business. Keep reading to learn more about email spoofing and how you can avoid it. Continue reading →
We all like upgrading to the latest and greatest tech. But before you get too distracted by your shiny, new device, take the time to think about what you are going to do with your old one. You may give it to someone else or let it sit in the corner but either way, it is important to take steps to protect the data on that old device before moving on. Continue reading →