So, your company is implementing a hybrid work model where your staff works from home a few days a week. Or maybe your company is going fully remote and closing the office. By this time, your company has probably updated their Information Security Policy...
With the rapid increase in data breaches and ransomware attacks, proper password and authentication management is vital for companies to protect their local and cloud assets. But with that importance also comes increased complexity and the need to deal with more...
In May of last year, I wrote about the forthcoming Cybersecurity Maturity Model Certification, or CMMC, regulations for DoD contractors and how it could become the new universal security standard (see https://www.spotlink.com/blog/cmmc). At that time, CMMC was...
What steps should small businesses take? The Russian invasion of Ukraine is both bad and sad on many levels, and in many ways. Luckily for us in the United States, other than some inflationary pressures, especially in gas prices, we have largely been unaffected...
Workers are replacing PCs with Mobile Devices Twenty years ago, if you wanted to access electronic information you really had two choices, PC or Mac. But today, companies have many more choices – Smart Phones, tablets, Chromebooks, and even Linux desktops. This...
Register wisely or pay a heavy cost! You have a great new business idea – it’s going to make you millions! One of the first things you do is register your internet domain name to cement your online identity. You’ll be using that every time you send an email or direct...