6 IT Policies to Help Protect Your Company

Many companies rely on IT to help run their businesses. For this reason, they often depend on a set of IT policies to ensure the productive, appropriate, and legal use of IT resources. IT policies establish expectations and regulations for behavior related to company computers and networks. In addition, IT policies detail consequences for employees […]

How Often Should Passwords Be Changed?

How old are your passwords? Almost half of the 2,000 U.S. and U.K. respondents in a TeleSign survey admitted they have not changed their passwords in five years. Even worse, more than 20 percent of them were using passwords that were more than 10 years old. You likely will not get much argument that these passwords are […]

What Surveys Say about Moving to the Cloud

Cloud computing has surged in popularity. The 2015 Cloud Security Spotlight Report clearly makes this point. More than 70 percent of the 1,010 participants reported that they use or plan to use a cloud computing solution. Yet, some organizations are still apprehensive about using the cloud. Common Concerns Organizations hesitant about cloud computing are often concerned about: […]

6 Reasons to Use Remote Monitoring to Keep an Eye on Your Systems

Many IT service providers use remote monitoring tools to gather information and send reports about their clients’ computer systems. Almost anything can be monitored, from routers and firewalls to virus detection and email services. Here are five benefits of using remote monitoring to keep an eye on your systems: 1. Reduce the Chances of Downtime […]