Mobile device security and virtualization

Mobile device security and virtualization

Securing mobile devices is challenging. They often have privileged access to sensitive data that they connect to via unprotected network connections. Virtualization vendors are finding ways to include solutions to these problems in their products and they’re perfect for small businesses. Mobile device management and virtualization Mobile device management (MDM) is about controlling how users […]

Back up your mobile devices now

Back up your mobile devices now

Smartphones have become so advanced that there’s virtually no business task they can’t handle. Now everyone uses mobile devices to access work documents and, naturally, hackers got the memo. There are thousands of threats targeted towards mobile devices, so you’d be well served backing up the files in your mobile device, now. Malware on mobile […]

7 easy ways to prevent data loss in Office 365

7 easy ways to prevent data loss in Office 365

For businesses, data security is critical. If this information is lost or stolen, it could lead to crippling financial losses, legal disputes, and more importantly, loss of customer trust. While Microsoft Office 365 comes with some security and compliance tools, it still needs the support of data protection best practices. Here are seven you should […]

Protect your devices with virtualization

Protect your devices with virtualization

With cybersecurity threats targeting small and large businesses, solutions that protect mobile devices are no longer a niche service. More work is being handled away from the office, which means more opportunities for security breaches. Virtualization vendors are leading the charge to tackle these challenges with innovative solutions. Mobile device management and virtualization Simply put, […]

7 tips for avoiding data loss in Office 365

7 tips for avoiding data loss in Office 365

Microsoft understands the value of your business’s data and the costly repercussions of losing it. That’s why they’ve released a slew of security and compliance tools for Office 365 subscribers. But given the increasing sophistication and frequency of data breaches, Office 365 cloud security solutions won’t be enough to protect your files. You’ll need to […]

Security Tip of the Week #3 – Protect yourself from ransomware by ensuring you have a good backup

Security Tip of the Week #3 – Protect yourself from ransomware by ensuring you have a good backup

I was reading a blog entry recently from one of our partners that focus on security awareness training. The blog entry was about the number of new variants of crypto-malware that have entered the "market" so far this year. They were aware of 41 new variants and made the disclaimer that the list may not be complete.

5 Bits of Information You Shouldn’t Email to Anyone!

5 Bits of Information You Shouldn’t Email to Anyone!

In the book Spam Nation, investigative journalist and cybersecurity expert Brian Krebs revealed the single most effective (and relied upon) way cyber crime rings gain access to your bank account, credit cards and identity. Ready for it? Email.

Whether it’s opening an attachment infected with a virus, or a phishing scam where you unknowingly give up your login to a critical website, e-mail still remains the most popular and reliable way digital thieves can rob you blind, steal your identity and wreak havoc on your network.