Where & What Are Your Employees Doing Online When You Are Not Watching?

Where & What Are Your Employees Doing Online When You Are Not Watching?

Keep Your Business and Employees Safe with an Internet Usage Policy An Internet usage policy provides guidelines regarding the appropriate use of company equipment, Internet, and network access. The Internet is a powerful tool for employees, however, a single moment of inattention or inappropriate use can transform the Internet into a huge security threat against...

avatar
Duleep Pillai
February 24, 2014
Discover More
Where & What Are Your Employees Doing Online When You Are Not Watching?

If you are using Windows XP After April 8th – You Are 6 Times More Likely To Be Hacked

Urgent Deadline Approaching Security technicians at Microsoft have compiled intelligence from a billion user systems worldwide in an effort to establish an important new metric called The Encounter Rate. The Encounter Rate measures how many Microsoft systems worldwide are receiving messages that contain Malware. From this metric Microsoft has been able to determine how many...

avatar
Duleep Pillai
February 21, 2014
Discover More
Where & What Are Your Employees Doing Online When You Are Not Watching?

Everything You Need to Know About E-Signatures

Electronic signature methods are becoming increasingly popular. While e-signing services vary from provider to provider, all services allow users to upload documents to an online service and apply special annotations where signatures are necessary. Then, the user sends this file to the recipient who signs the document and sends it back. Are Electronic Signatures Legal?...

avatar
Duleep Pillai
February 19, 2014
Discover More
Where & What Are Your Employees Doing Online When You Are Not Watching?

Microsoft Offers Multi-Factor Authentication to All Users of its Office 365 Suite

Multi-factor authentication has been available for administrative roles since June 2013, however, Microsoft recently added multi-factor authentication for all users of its Office 365 suite. “The multifactor authentication increases the security of user logins for cloud services above and beyond just a password,” Microsoft said. The company will also bring multi-factor authentication to Office 2013...

avatar
Duleep Pillai
February 13, 2014
Discover More
Where & What Are Your Employees Doing Online When You Are Not Watching?

Make Sure Your IT Department Safeguards Your Technology to Avoid HIPAA Security Breaches

The HIPAA Security Rule was enacted in 1996, designed to establish national standards to protect individuals’ electronic personal health information (PHI) used and/or stored by a covered entity. Many healthcare organizations have complex technology environments, thus making it difficult for healthcare providers and business associates to comply with the HIPAA Security Rule policies and procedures....

avatar
Duleep Pillai
February 12, 2014
Discover More