In the first part of this blog series we discussed the role of social media usage in the workplace and its possible effects on security. We closed the piece by suggesting that companies address the issue with the creation of a formal Communications Security Policy. Today we are going to be offering some common-sense pointers on just how that should be done:
At any given moment nowadays, on-the-clock staff are checking and updating their social media statuses, reading feeds and networking on business media sites. Moments will often stretch to minutes: A recent study by the Ponemon Institute found that 60% of social media users spend a minimum of half-hour daily on these sites when at work.
One of the most common questions people often have when it comes to Ethernet cables is what do the numbers mean and what’s the difference? We hear this question from both people looking to change or upgrade their home network and from businesses hoping to do the same.
If you have ever paid attention to your current ethernet cables – which it is probably unlikely you do – you know that would each cable is labeled with the abbreviation “Cat,” followed by a number like 6, 6a, or 7. Essentially, “Cat” just means “category.” The number that follows refers to the cable’s specifications, such as bandwidth and transmission speed.
The digital element of a huge number of businesses operating in all kinds of niches continues to experience tremendous growth. And while that growth may be great for both a customer or client’s experience with a company, and for that company’s bottom line it can place huge stresses on the cabling systems that keep a business computing network up and running.
Data security is a big concern for most businesses. The number of stories in the news about devastating hacks seems to increase all the time and it is not just big businesses that need to take notice, a business of any size can be at risk as well.
For all the security hardware and software precautions that can be put in place to help better secure data – and there are some amazing solutions out there right now well worth considering – often data breaches are caused by the simplest things. One of the biggest issues? Insecure password use.
Many business owners start their business using a set of Excel files. They continue to use them as the business grows. A single Excel file can have multiple sheets of data, such as products sold, leads to call, quotes sent out to customers, and much more.
It is difficult to get this solution to work efficiently and cohesively. For instance, when you create a quote, it would be more efficient to have the capability to pull-up the list of products straight from a central, organized list of products.
VOIP can be a great communications solution for businesses of all sizes. It offers many advantages over a traditional PBX system and it is an increasingly popular choice with Southern California businesses.
VOIP is not, however, perfect, no technology is. One possible downside of VOIP is the danger of the system being hacked.
Yes. Hacked. Many people don’t even realize that a VOIP system can be hacked. Depending on who installed your VoIP system and the other security precautions your business has in place – or does not have in place – it might be very easy to hack your VOIP based communications system. But how would you even know?
Even if you hate them, and many of us secretly do, no matter what business you’re in, meetings are a necessity. And, more often than not, lots of them.
The good news is, however, that the meeting experience as we know it is improving. In the past people had to gather together awkwardly in conference rooms, making uncomfortable small talk until the meeting was called to order, often after having to travel miles to attend in the first place.
Network security has possibly never been as important as it is right now. 2017 has been filled with disaster stories about crippling hacks (including that one that knocked out most of the UK’s National Health Service for a while) and on a smaller scale the number of companies left seeking help when their network was taken down by a random virus, or worse still when it was hijacked by a dreaded ransomware exploit, has increased significantly.
It’s holiday season again, and at work that means time for office gifting and secret Santas. Which can be a real pain. With a budget limit – and often a limited knowledge of what a person might consider a good gift – it’s often hard to buy something that might be appreciated.