Author: Greg Bartos

04 Aug 2016
data security

Data Security Class

We are protecting your digital assets with firewalls, passwords and other digital methods. We detect intrusion attempts and virus attacks with special software that runs on the firewall and your workstations. We respond to your calls when you have a problem or when we a problem is detected. Between protection, detection and response, which is the most important? We believe it’s detection – as would you if you didn’t detect a large man with a big knife was standing over your bed at until you opened your eyes!! The best investment you can make in your security is to train your staff. Give them the tools and training necessary to detect attempted data breeches by signing up for our Security Awareness class. The content is updated with current events and true stories all the time. 

The class is 1 hour long, $250 for 1-25 people.

04 Aug 2016
multi-factor authentication

Multi-factor Authentication

You’ve seen this already. You try to access your Gmail account and you have to put in a code Google texted to your phone; or you add a credit card to Apple Pay on your iPhone and you have to approve the addition from another Apple device. Everybody has passwords – and they’re getting longer and more complex all the time! We all hate it. The answer coming down the pike is multi-factor authentication (MFA). Here’s the idea. Instead of just providing your password to access your data (email, files, etc.) you provide at least two of the following: Something you know (like your password), something you have (like a code from your mobile device) or something you are (like your fingerprint.)

MFA is being used more and more. There are apps that you can put on your mobile device that generate a code every 30 seconds. Your bank may require you to put in a code that was texted to your mobile device. Your online shopping site may require you to put in a PIN to login. You can receive a code via text message. You can use facial recognition (read about the Enterprise-grade security of Windows Hello here.) You can use the fingerprint scanner on the home button of your iPhone.

Get used to it. MFA is here and it will become the norm. If you want to increase security, give us a call. 704-814-8819

04 Aug 2016
mobile device management

Mobile Device Management

How do you deal with the fact that your digital assets are on your employee’s phone? What if they lose the phone? It can not only be bad for business, it may be against the law, depending on your market and the data that has been compromised. Mobile Device Management (MDM) is built into Office 365. Even if your employees own their own devices (which is most common) you can have them register their device with Office 365 in order to have email on the device. Then you control access to the data. You can use MDM for Office 365 to do a selective wipe to remove only organizational information, or a full wipe to delete all information from a mobile device and restore it to its factory settings.

If you’re interested in learning more about MDM, give us a call. 704-814-8819