Blog

Blog

Laptops, Tablets, and Smartphones All Create Attack Paths to Your Network - Here's How Endpoint Security Blocks Them.

Remote Devices Provide a Weak Link for Hackers to Exploit


The internet of things (IoT) and office policies of "bring your own device" BYOD, have created network vulnerabilities like never before.

Read More »

Data Security Round Up: Our top advice

October is National Cyber Security Awareness Month. In recognition, we're rounding up some of our top security blog posts and tips from the past few years. There is never a 100% guarantee when it comes to data security. But following the advice in these posts, along with implementing the right system, will certainly get you a lot closer.

Read More »

Preventing Data Breaches with Mobile Device Security

Recent data breaches for both iPhone and Android OS's highlight the need for businesses to pay attention to mobile device data security.

Whether or not you’re giving your employees cell phones to use for work (or have Bring Your Own Device (BYOD) policy), it’s likely that you have employees using their cell phones or tablets to access company information (like email and sensitive line-of-business applications).

Read More »

6 Tips to Keep Your Data Safe on Vacation

It's summer time, which for many, means vacation. And for most workers, it means not completely unplugging. As much as we'd love to put the phone away for a week, most of us are still checking emails or keeping up with the news on our phones.

But relaxing on the beach or in the mountains, doesn't mean you should relax when it comes to your data security. Keep these tips in mind when you're on the road to keep a data breach from ruining your vacation:

Read More »

Staying Informed with the Office 365 Administrator App

This post comes from PTG Project Engineer and Office 365 administrator, Matt Banning. 

Read More »
   
New Call-to-action

Posts by Topic

see all