Business Growth: Technology

cloud image

Is it safe to store corporate information on Google Drive (or similar services)?

BY JOSEP ALBORS When it comes to storing a company’s confidential information and/or backing it up, various questions tend to come up with regard to the location where this storage will…

simon

For Recruiting Firm, APT Blocker Is Best Candidate for the Job

Case Study With lots of threats around on the Internet and staff who are recruitment consultants first – and not IT security experts – we wanted to make sure that…

Future of management photo

What’s the future of management?

Business management in the digital age When automation transformed the manufacturing sector across the Western world during the 1980s and ‘90s, many white-collar workers were nonplussed at the wave of…

Hacker

Keeping business laptops secure

Keeping business laptops secure When it comes to notebook computers, their greatest strength can often seem to be their most profound weakness. The very portability that makes them such useful…

Irene Haws

Human behavior can be the weak link in your cybersecurity

By Irene Haws, Dynamic Computer Solutions of Topeka, Inc. Human behavior can be the weak link in your cybersecurity. It is important to provide training for your employees to recognize…

The Great Rewrite

THE GREAT RE|WRITE

Artificial Intelligence: An in-depth look at how AI is rewriting the world around us. Presented by KPMG, Forbes| brandproductions THE CHANGES COMING WILL RIPPLE ACROSS INDUSTRIES AND INSTITUTIONS, FUNDAMENTALLY CHANGING…

server

5 Tips for Successful Server Maintenance

By Brett Nordquist June 15, 2017 Few events bring a company together like a server outage.  When the Exchange Server would go down at Microsoft, our group would race towards…

criminal

10 ways to ruin a cybercriminal’s day

BY LUCAS PAUS Technology has changed the way we live, our relationships with others, and even how we take care of ourselves. These days, everyone – from the most inexperienced to…

image001

Mobile security: The reality of malware … augmented

BY DENISE GIUSTO BILIĆ Originally, it was expected that mobile devices would evolve to become handheld computers with capabilities like any desktop. It is clear today that our smartphones and tablets…

Kate Fredrickson

Basic tips to avoid cybercrime

By Kate Frederickson, ISG Technology With people using the Internet for banking, shopping, socializing and everything in between, the risk of falling victim to a cybercrime scheme has never been more…