The traditional employment model of jobs for life and a 9-5, Mon-Fri has undergone a major shake-up over the last couple of decades. Advances in technology have provided the springboard for mobilisation in a number of ways and we are going to look at some examples…
Where are the end points on your network? What does that even mean today? In this world of connected devices, it is vital that each piece of hardware on your network is protected effectively.
One term you may have heard a lot about is “end point security”. Unless you are an IT Manager, this rather unhelpful term doesn’t really offer much of a clue about what it means. So we look at what end point security is, and how the product Bitdefender GravityZone product could help you…
If you think that installing Anti-virus software on your office computer is going to protect you from the latest generation of malware, think again. Every day, with over 230,000 new malware threats created and released online, we have watched the evolution of these programmes, from primitive adware, to being capable of fooling both the most tech-savvy user and the software designed to remove them.
So what can you do to protect your business?
As we approach closer to the GDPR deadline, we’ve been getting a lot of questions regarding whether business email addresses and contact details will come under the GDPR as ‘personal data’.
The Information Commissioner’s Office (ICO) have produced an article titled; ‘The rules around business to business marketing, the GDPR and PECR’ which should hopefully answer some questions you might have…
The life of an IT manager can often feel like a thankless task. Staying on top of daily and weekly tasks can be difficult when problems and projects shift your focus away from basic housekeeping.
Could it be time for an IT spring clean in your business?
The GDPR is a big leap in data protection legislation and with the ruling applicable across the whole of Europe, we are finally bridging the gap between our digital identities and the law. From retaining your marketing channels to the legal and financial implications of future possible mistakes, from accounting and payroll to recruiting processing and HR, the GDPR will affect everything.
It sounds daunting when you present it in these terms, doesn’t it?
So, before feeling overwhelmed with abstract legislation and how much hard work this will surely be, we want to position the GDPR in a way that it should make it worth the extra meetings.
What happens when the dangers of oversharing online cross into the professional realm?
It’s true that some bosses think that checking your social media accounts is just due diligence these days. But it isn’t just potential employers of whom you need to be wary. There is a criminal risk too. Hackers and criminals are employing increasingly sophisticated and targeted attack vectors – meaning that oversharing on social media can expose the organisation to malware, spear phishing attacks, ransomware and other nasties…
Passwords have an important role to play in any organisation’s cyber security – whether to protect user access to applications, data or email.
So what should organisations be doing to ensure that the passwords and password policies being used are up to scratch?
One of the biggest business disruptions is unplanned employee absence. During winter there is always a high probability of bad weather and there are plenty of colds and illnesses going round, resulting in many businesses advising employees to stay at home rather than share their germs with the rest of the workforce.
This article will show you how you can keep your business going by making your technology work for you…
Bring Your Own Device (BYOD) policies are rapidly gaining traction in the modern workplace owing to the flexibility and convenience they provide to both employees and their employers. However, just like any other major change in the workplace, BYOD comes with its fair share of challenges.
Therefore, you need a carefully thought-out BYOD policy that protects your corporate apps and, more importantly, your data while upholding the rights of your employees.