Blog Search


Searched Tag: BYOD

Mobile Tech: Is Yours Protected?

BYOD (Bring Your Own Device) is commonplace in most small businesses, but does it put your company at risk?
Data Loss, Malware, Malicious Websites, App Hijacks, Phishing, Smishing (SMS fishing), spam calls: These are just some of the risks posed by mobile devices to corporate and pri…… https://customcomputer.me/blogs/mobile-tech-yours-protected

Mobile Devices: Convenient and Useful, but Present Special Risks

Most of us use smart phones for business and our personal lives, and uses are growing. However, due to their size, rendering of content often obscures information that would more readily identify malicious content. Here are tips to make your use less pron…
Who doesn't have a smartphone? We conduct business from them, run our homes, shop, bank and track our health from them. How many have given up landline phones and only use thei…… https://customcomputer.me/blogs/mobile-devices-convenient-and-useful-present-special-risks

Keeping your data safe: Access Control

Protecting your data is achieved by a combination of practices. Are you covering all the bases?
Cyberattacks are commonplace today. Malware such as viruses, worms and more recently ransomware not only corrupt your data or hold it hostage, but also inflict irreversible damag…… https://customcomputer.me/blogs/keeping-your-data-safe-access-control

BYOD: Why is This Concept So Attractive to Employees?

BYOD, to work started as an occasional thing several years ago, but has quickly become a pervasive reality. To use your personal smartphone, tablet or laptop for work seems increasingly natural. Employees are embracing this concept without any serious res…
Bring Your Own Device, or BYOD, to work started as an occasional thing several years ago, but has quickly become a pervasive reality. To use your personal smartphone, tablet or…… https://customcomputer.me/blogs/byod-why-concept-so-attractive-employees

WFH: How we got here

If you’ve been in the workforce for a while, you remember what life in the office was like a few decades ago. The uniformity of the structure was pretty much the same. Now WFH and BYOD is the norm. Are you prepared?
If you’ve been in the workforce for a while, you remember what life in the office was like a few decades ago. The uniformity of the structure was pretty much the same, no…… https://customcomputer.me/blogs/wfh-how-we-got-here

WFH: Remote Data Access and Data Security

When your employees are working in your offices, you control their methods of access to company data, but once access goes remote, data security becomes a bigger challenge. It is an issue that you have to consider when evaluating WFH policies.
This may be the single biggest concern you may have to address when looking at WFH. When your employees are working in your offices, you control their methods of access to comp…… https://customcomputer.me/blogs/wfh-remote-data-access-and-data-security

Data Protection and Bring Your Own Device

BYOD is a pretty common policy, and it has many benefits, but it brings along risks. How are you addressing these risks?
BYOD refers to a firm's policy of allowing employees to use their own personal phones, tablets and laptops for all their work applications. This is a pretty common policy, …… https://customcomputer.me/blogs/data-protection-and-bring-your-own-device

SMBs: It is Hackers v. You - Don't Let Them Score

Small to mid-sized businesses can be easy and lucrative targets for cybercriminals because they are typically less protected than large corporations and often have valuable information such as credit card information, Social Security numbers, addresses, d…
Selling stolen IDs and other personal data is a lucrative trade for hackers. They are always looking for sources where vital information is stored. As a small to midsize busine…… https://customcomputer.me/blogs/smbs-it-hackers-v-you-dont-let-them-score