Blog Search


Searched Tag: security policy

Your small business: target for a breach? No...

Small businesses make easy, lucrative targets for ransomware and malware that harvests Personally Identifiable Information (PII). Employee, customer and vendor data can provide cybercriminals with enough information for fraudulent activities, but there ar…
Maybe you think that as a small business, your risk of a data breach is low because larger companies are bigger targets and therefore more desirable to cybercriminals. Think ag…… https://customcomputer.me/blogs/your-small-business-breach-target

Remote Workforce - Tips for Employers

Enabling employees to work remotely can be offered as a perk, be a contingency plan or a bit of both. Technology provides many tools that simplify remote work, but plan your implementation to protect your business and maintain a sense of team.
The current Coronavirus pandemic is making it necessary for most to consider remote-enabling their workforce. Fortunately, technology makes this easier than ever, but that ease…… https://customcomputer.me/blogs/remote-workforce-tips-employers

Making Working from Home Work

Working from home can be a perk and a productivity boost. Make the most of your tools and space while maintaining privacy and security of corporate data.
Maybe you are a seasoned road warrior and accustomed to remote work, or maybe working from home is all new. Fortunately, technology makes it quite feasible. Here are some guideline…… https://customcomputer.me/blogs/making-working-home-work

It is Heaven! Using the Cloud to Challenge Big Business

What is the cloud? How can it benefit your business?
Has anyone suggested you begin moving your business to the cloud? Cloud data storage or cloud computing? What is this, anyway? And isn't it something for huge companies? …… https://customcomputer.me/blogs/it-heaven-using-cloud-challenge-big-business

BYOD: Why is This Concept So Attractive to Employees?

BYOD, to work started as an occasional thing several years ago, but has quickly become a pervasive reality. To use your personal smartphone, tablet or laptop for work seems increasingly natural. Employees are embracing this concept without any serious res…
Bring Your Own Device, or BYOD, to work started as an occasional thing several years ago, but has quickly become a pervasive reality. To use your personal smartphone, tablet or…… https://customcomputer.me/blogs/byod-why-concept-so-attractive-employees

Three different issues about WFH you may have not considered

Moving your staff from centralized locations to numerous remote locations comes with a few challenges to address properly so your business stays protected and HR problems are avoided. Even as some return to the office, attention to these points will have …
Today’s blog is a look at three different issues that don’t get much coverage in discussions of the implementation of a WFH policy. Much of the conversation tends t…… https://customcomputer.me/blogs/three-different-issues-about-wfh-you-may-have-not-considered

WFH: Remote Data Access and Data Security

When your employees are working in your offices, you control their methods of access to company data, but once access goes remote, data security becomes a bigger challenge. It is an issue that you have to consider when evaluating WFH policies.
This may be the single biggest concern you may have to address when looking at WFH. When your employees are working in your offices, you control their methods of access to comp…… https://customcomputer.me/blogs/wfh-remote-data-access-and-data-security

Everyday Human Error Can Affect Data Protection

Are you under the impression that data loss is all about putting up firewalls to protect against evil cyberattacks? Some of the biggest sources of data loss include sloppiness, human error, and just plain forgetfulness.
Are you under the impression that data loss is all about putting up firewalls to protect against evil cyberattacks? Some of the biggest sources of data loss include sloppiness,…… https://customcomputer.me/blogs/everyday-human-error-can-affect-data-protection

Down the Pipeline

Just as it seemed we might be seeing clear skies ahead in terms of the pandemic, another dark cloud began to rise on the horizon. The Colonial Pipeline breach hit the news and many people began to panic. We were all too familiar with uncertainty of the …
Just as it seemed we might be seeing clear skies ahead in terms of the pandemic, another dark cloud began to rise on the horizon. The Colonial Pipeline breach hit the news and …… https://customcomputer.me/blogs/down-pipeline

SMBs: It is Hackers v. You - Don't Let Them Score

Small to mid-sized businesses can be easy and lucrative targets for cybercriminals because they are typically less protected than large corporations and often have valuable information such as credit card information, Social Security numbers, addresses, d…
Selling stolen IDs and other personal data is a lucrative trade for hackers. They are always looking for sources where vital information is stored. As a small to midsize busine…… https://customcomputer.me/blogs/smbs-it-hackers-v-you-dont-let-them-score