Considering a BYOD Policy at Work?

Thinking of adopting a “bring your own device”, or BYOD, policy at work? Learn more about what it is, why it’s becoming popular – and what you need to consider before rolling it out.

You may have noticed more and more of your employees or colleagues bringing their own computing devices to work—be it their mobile phone, tablet, or laptop.

Free Tools to Increase Productivity

For smaller companies and businesses who are constantly on the lookout for great free finds on the web: here are a few nifty and free online tools that might potentially help you, both in saving costs and boosting your productivity and efficiency.

It is a constant challenge for small businesses to meet ever-changing and ever-evolving IT requirements while balancing a budget and keeping costs reasonable.

HD Shortage Results from Thai Floods

A worldwide shortage of hard drives is expected in the near future as many of the Thai-based factories continue to struggle with flooding.

In the same way the massive earthquake and tsunami damaged Japan’s electronics industry, the flood crisis in Thailand is causing concern for companies that require hard drives for production.

How to Use Internal Social Networks

The use of social networks has changed the way many people communicate with each other online. In the same vein, internal social networks can also enhance communications within a given organization, but only if the right policies to govern its use are developed and implemented by the company it belongs to.

The Worst Passwords for Security

It doesn’t matter how solid your security system is –any hacker or online thief can figure out a weak password in a couple of hours through trial and error. Don’t risk being a victim of a security breach and data theft. Avoid these passwords that are especially easy to crack.

4 Million Bots Busted c/o Trend Micro

In an unprecedented move against online fraudsters and hackers, the United States Federal Bureau of Investigation (FBI) and authorities in Estonia, aided by information from security firm Trend Micro, recently conducted a raid that brought down an enormous bot network made up of at least 4 million bots.

The Threat of Employee-Owned Devices

Employees using their own mobile devices for work may seem like a good idea at first – it’s less expense for you, the employer, and they can also make employees more productive. However, it also means that you are allowing potentially unsecure devices to access your company’s data.

Security and Small Businesses

Fact: all it takes is one security breach to destroy a company. But few – especially small businesses – seem to realize it, according to a recent survey released by StaySafeOnline.org. Results show that few small businesses see themselves as a target of online thieves or hackers, resulting in many having only token security policies in place.

Don’t Get Scammed on Facebook

A word of caution for Facebook users: Hackers and scam artists are now using promotions and all other sorts of come-ons to victimize users into falling for phishing traps or giving up personal information. It is important to know what to do to avoid becoming a victim as well as securing your system to prevent any unwanted data breaches.