Monthly Archives: September 2015

Spearfishing and Whaling: How To Protect Against Phishing Scams

Phishing scams typically come from email messages – and it can affect your desktop, laptop, tablet, or smartphone. Phishing scams work by enticing you to click a link in an email message, bringing you to an incredulous website. There, the website will force you or encourage you to divulge private information, like your full name, address, or sensitive financial data. Then the person on the other side of the website will be able to use your private information for their use. Identity theft is a reality of using the Internet. However, by understanding how phishing scams work, you will be able to identify them and prevent them from being a problem.  Continue Reading

Understanding Managed Services and How They Benefit SMBs

Small to medium sized businesses (SMBs) receive a lot of calls each day from slick sales people peddling the next technology trend that’s going to save them money and revolutionize how they do business. They’re all too quick to caution that if you don’t listen to them, you’ll fall behind the times, and eventually be swimming in a sea of debt and out of business.

Continue Reading

  • 09/18/2015
  • IT

What You Can Learn from Business Regulator’s Business Continuity & Disaster Recovery Recommendations

U.S regulators have recommended that all futures and securities firms review and update their current data backup, disaster recovery, and business continuity solutions.

Prompted by closures in the equities and options market in the aftermath of Hurricane Sandy, Regulators including the SEC, FINRA, and the CFTC contacted firms to assess the impact Hurricane Sandy had on their operations.

Continue Reading

  • 09/14/2015
  • IT

3 Things to Consider Before Jumping Into BYOD

You’ve read it time and time again. “Bring Your Own Device” isn’t a trend, it’s the future. Workplaces where companies let workers use their own devices for work purposes are the new normal. BYOD attracts new hires and lifts employee morale and productivity. But this doesn’t mean a small business owner should recklessly jump right into BYOD just because everyone else is doing it.  Data and network security concerns have to be thought out, defined, and addressed in a comprehensive BYOD policy. Here are three things to consider. Continue Reading

  • 09/02/2015
  • IT