Remote Devices Provide a Weak Link for Hackers to Exploit
The internet of things (IoT) and office policies of "bring your own device" BYOD, have created network vulnerabilities like never before.
The internet of things (IoT) and office policies of "bring your own device" BYOD, have created network vulnerabilities like never before.
October is National Cyber Security Awareness Month. In recognition, we're rounding up some of our top security blog posts and tips from the past few years. There is never a 100% guarantee when it comes to data security. But following the advice in these posts, along with implementing the right system, will certainly get you a lot closer.
Read More »Whether or not you’re giving your employees cell phones to use for work (or have Bring Your Own Device (BYOD) policy), it’s likely that you have employees using their cell phones or tablets to access company information (like email and sensitive line-of-business applications).
Read More »It's summer time, which for many, means vacation. And for most workers, it means not completely unplugging. As much as we'd love to put the phone away for a week, most of us are still checking emails or keeping up with the news on our phones.
But relaxing on the beach or in the mountains, doesn't mean you should relax when it comes to your data security. Keep these tips in mind when you're on the road to keep a data breach from ruining your vacation:
Read More »This post comes from PTG Project Engineer and Office 365 administrator, Matt Banning.
Read More »Palmetto Technology Group
330A Pelham Rd. Suite 200
Greenville, SC 29615
Palmetto Technology Group | Copyright 2017