3 Reasons Why You Need Policies to Communicate Security Expectations to Your Remote Workforce
If you’re relying on unspoken or informal standards to communicate security expectations to your remote workforce, then you can expect to have some confusion and gaps in the way your company is managing cybersecurity. Documented security policies are what you need to inform employees about acceptable…
Lack of Security Policies = Cybersecurity Red Flag
If you need to follow regulatory compliance for protecting information, you probably already know that a good chunk of your cybersecurity strategy is in deciding how you’re going to control access to information with security policies. The creation of security policies, however, is important for any business…
XPERTECHS Ranked Among World’s Most Elite 501 Managed Service Providers
FOR IMMEDIATE RELEASE: Ellicott City, Maryland – July 28, 2020 – XPERTECHS, has been named as one of the world’s premier managed service providers on the prestigious 2020 annual Channel Futures MSP 501 rankings. For the 13th year running, MSPs from around the globe completed an exhaustive survey…
More Virtual and Less Physical: How Friedman, Framme and Thrush’s Footprint Is Changing with Remote Working
When Bill Thrush was starting his career as an attorney back in 1994, the internet was new and the technology that law firms depended on were the telephone and the fax machine. He has watched technology evolve over the years, and he’s been a proponent of remote working long before COVID-19 forced companies…
Remote Work Slows Creative Process But Reveals Resilience at Bonstra | Haresign ARCHITECTS
You can’t blame the people at Bonstra | Haresign ARCHITECTS if they feel a little out of sorts as they work from their individual remote locations during the COVID-19 public health crisis. After all, the work they do in architectural design is all about creating physical spaces that not only set the…
What To Do If You Fall For a Phishing Scam
Cybercriminals are opportunist predators and right now they are exploiting fears and concerns about COVID-19 in order to get people to click on links, open attachments, or give away confidential information in response to a message that is delivered in an email. This hacker tactic, called phishing, is…