Over the past two decades, business technology was largely separated between information technology (IT)--that is, the business’ computers,...
Reciprocal Technologies Blog Security • Page 25
Don’t Be Dumb About Smart Technology
A few years ago, there was a decision made to make a concerted effort by manufacturers to create their products, but to also create those same...
Properly Assigning Access Control Measures Doesn’t Have to Be Difficult
Unless you run a business in which each and every employee is responsible for identical tasks, you are going to encounter the need for variable...
Tip of the Week: 3 Key Factors to Securing Your Data
With data being such a valuable asset today (especially personally identifiable data), you can’t afford to let any of the information your company...
Best Practices to Control Your Access Control
Over time, your business will accumulate a lot of data, including some that certain employees or departments will have no need to see (or perhaps...
Start Off 2020 by Auditing Your Online Accounts and Passwords
Let’s take a look at a real-world scenario that I ran into a few weeks ago with a family friend. For the sake of this story, let’s call him Bob. Bob...
These Are the Last Days of Windows 7
Microsoft is just days away from retiring not just one, but two of its most popular operating systems. The software giant has made a point to run a...
Security Has to Be a Priority in 2020
Cybercriminals aren’t exactly holding back when it comes to attacking businesses, which means that businesses can’t rest on their haunches as the...
A Recent Data Theft Shows Us What to Watch Out For
Trend Micro, the developer of the popular antivirus program, has attracted some unwanted attention after a former employee managed to steal customer...
Start Using Two-Factor Authentication Everywhere, Today
It can be easy to slack off when it comes to good password practices. Many users still use the same password across multiple sites and often don’t...