Five Tips for Working From Home

As uncertainty over the novel coronavirus, COVID-19, grows, many companies are practicing social distancing and sending their employees home to work. If this is your first time working from home, you probably rolled out of bed the first day in your pajamas filled with visions of breezing through your weekday. Continue Reading

  • 04/13/2020
  • IT

Social Hacking Tactics During the Coronavirus

In a time when businesses and individuals are stepping up and helping their neighbors, the true nature of a hacker really shines through. Right now, businesses are offering sick-leave, donating medical supplies, and some are even opening their doors as supplemental hospitals. Professionals are either risking their lives to help others or are dutifully working from home to help contain the virus spread. Continue Reading

Power Your Work-at-Home Employees With Remote Desktop (RDP)

At BWS Technologies, we are looking at a global workforce that has been forced by COVID-19’s threat to a new focus on working at home (WAH). This novel virus started in China, and, as of late March 2020, has impacted more than 189 countries and territories. There is no disputing the need for social isolation, and there is a need for public and private workforces to be innovative without decreasing productivity. Continue Reading

5 IT Risks Your Company Faces When an Employee Leaves

Cybersecurity writer Sue Poremba recently shared an experience that shows how blind many companies are to the IT security risks they face when an employee leaves.

Weeks after quitting a job to take a new position, Poremba needed some information that she thought might be in her email inbox at her former company. Acting on a whim, she tried to log in to that old email account. To her astonishment, not only was she able to access her email, but she found that she still had access to everything on that former employer’s network, including sensitive employee records and company financial information. As Poremba notes, if she had been a vindictive ex-employee, she could have done untold damage to her former company. Continue Reading

6 Steps That Might Be Missing from Your Disaster Recovery Plan

Drawing up a disaster recovery plan for a small- to mid-size business can be a challenging prospect. You may have looked online for a generic guide on how to write a disaster recovery plan. While this can be a good start, there are also steps you should include that you may not consider after looking at a blank template.

Let’s take a closer look at six steps that might be missing from your disaster recovery plan, why you should include them, and how to implement them into your plan. Continue Reading

Mitigating the IT Risks Your Company Faces During Employee Turnover

According to the Cost of a Data Breach Study by IBM and Ponemon, the global average cost for data breaches was $3.6 million. This amounted to an average of $141 per record.

Although insider threats are often thought of as being the biggest risk, employees who have recently quit or been terminated may pose an even bigger one. What type of dangers could your company be facing, and what can you do to mitigate them? Here is some information you need to know. Continue Reading