You have probably come across the term multi-factor authentication of late. It is an IT buzzword today and...
IT Governance
Social Engineering, Security, IT Governance, NIST, Ransomware
Dark web monitoring: What you need to know
The dark web is essentially a marketplace for cybercriminals. If your data has been compromised, the dark web...
Innovation, Security, IT Governance, NIST
Cyber insurance: What’s the cost and what does it cover
Cyber insurance covers a range of elements, the most basic being the legal expenses incurred as a result...
Security, Innovation, IT Governance, NIST
Cyber insurance 101
What is cyber insurance With cybercrime becoming a major threat to businesses across the world, irrespective of their...
Innovation, IT Governance
What should your privacy policy cover?
As a business, you deal with a lot of personally identifiable information on a daily basis. It can...
Innovation, IT Governance
7 Tips for creating a great privacy policy
A privacy policy is not just a legal requirement, it is a tool to help earn your customers’...
Innovation, IT Governance
Part-2: What’s your argument against an SLA with an MSP? (And why...
In our last blog post, we discussed 3 reasons SMBs usually cite for not signing a service level...
Innovation, IT Governance
Part-1: What’s your argument against an SLA with an MSP? (And why...
Managed IT services are becoming more popular by the day. Businesses, big and small, are bringing managed service...
Innovation, IT Governance
Three things to consider when investing in new software
When running a business, you will often find yourself in need of new software tools to enhance the...
BYOD, IT Governance, Innovation, Work from Home, Security
Best practices for remote desktop access
Remote desktop access is essential in these days when businesses are expected to be responsive to their clients...
Security, Innovation, IT Governance, NIST
Five reasons to invest in a password management system ASAP
Password management tools are software programs that put up enough security and safety mechanisms in place to ensure...
Social Engineering, Security, IT Governance, NIST
Eight common password mistakes to avoid
Research points out that more than 80% of data breaches happen due to password hacking, meaning that poor...