Tag Search: security training
Posted on Friday May 05, 2023 | monitoring, security, byod, policy, two factor authentication, device, mobile device management, security training
Bring your own device (BYOD) arrangements have become increasingly popular in today's workplace, enabling employees to use their personal devices to access work-related applications and data. However, BYOD also presents a security risk, as personal devices may not be as thoroughly protected as corporate devices. Hence, it is crucial to increase BYOD security to ensure that sensitive data is protected from unauthorized access.
Posted on Wednesday December 14, 2022 | security training, ransomware, protected health information, privacy, phi, malware, healthcare it, full disk encryption, data breach, cybersecurity, access policies
If your business handles protected health information (PHI), it's your duty to take every step possible to ensure that your clients' data is secured. Cybercriminals often target PHI because it contains personal, medical, and financial information that they can exploit for profit. This blog will discuss best practices your business can adopt to protect your customers' PHI.
Posted on Friday July 30, 2021 | password, byod, bring your own device, data backup, security training, it management, access restriction, device security
Bring your own device (BYOD) policies give employees the flexibility to use devices they are comfortable with while allowing businesses to reduce hardware spending. However, BYOD also carries plenty of security risks.
Posted on Wednesday April 26, 2017 | word, security training, security, phishing, office, microsoft, malware, dridex
Software developers and hackers are in a constant game of cat and mouse. When cybercriminals find new security bugs to exploit, tech companies have to quickly release a solution that secures those vulnerabilities. Just this month, Microsoft released a patch to eliminate a Word exploit designed to steal user information. If you're an avid Microsoft Word user, here's what you need to know about the bug.
Page: 1