Wireless Security: is Public Wi-Fi Safe to Use?
For Today’s Tuesday Tech Tip, I’m coming to you from Nashville, Tennessee, at the Robin Robbins event here. I want to talk to you about
How to Secure Your Data When Using Subcontractors
For today’s tech tip, I want to talk about ways that you can share data and keep it under control whenever you’re using an outsourced third party.
What is Shadow IT?
For today’s, Tuesday Tech Tip I want to talk to you about shadow IT. What it is and why every business owner must have this on their radar?
5 Cybersecurity Trends to Watch in 2022
For this week’s Tuesday Tech Tip. We’re going to talk about the 5 biggest cybersecurity trends that are expected in 2022 as it relates to cybercriminals.
What Is A Technical Business Review?
For today’s Tech Tip Tuesday, we’re going to be talking about a Technical Business Review. What it consists of and why you should be doing it on a systematic
Digital Migration
For our Tuesday Tech Tip, I want to talk to you about what they’re calling the Digital Migration. We talked about what that looks like and really what that means as we look forward into the future and stay tuned.
Attrition Planning 2022
For this Tuesday Tech Tip, I want to help you with your 2022 planning for employee attrition this is something that is affecting every business owner that I know.
5 Keys to Great Client Relationships
https://youtu.be/dkxsx8lJoEA For our 2022 Technology Tech tip Tuesday. I want to kick it off with five key ways that we strive as a company in order to provide you with better customer service. Communication provides the means by which great relationships and partnerships are executed and solidified. They lead the way to desired results of […]
What Are File Permissions?
https://youtu.be/9d75lm62BXM Today I want to talk to you about file permissions and the need to review those on a periodic basis. These are ultimately just files that you create on your computer. Many times, the files are on what we call a network share. The files are under the Q drive or the Z drive. […]
What Is A Baseline Security Assessment?
I want to talk to you this morning about a baseline network analysis, or possibly what could be called a security risk assessment. And why you need one. Philip Long here, CEO of Business Information Solutions in Cyber Fortress. First off, let’s talk about what is a baseline security risk assessment? Well, ultimately, it is […]