Why you need Two-Factor Authentication (2FA) now more than ever

Despite the constant bad news about data breaches, password hacking, phishing, and account takeover, there is a bright spot: by using Two-Factor Authentication (2FA) you can easily add an additional layer of security to any login. 2FA takes the simple username/password system to the next level. You may already be using 2FA for banking or social media websites. Logging in by getting a text with a one-time code is an example of 2FA in...

Zoom safely!

Zoom has recently been embraced by millions of people around the world trapped in their homes by the coronavirus. Unfortunately, Zoom’s sudden rise in popularity has not come without growing pains. In the last few weeks Zoom has been buried in an avalanche of bad press after numerous security flaws have been revealed. One US middle school held a virtual classroom that was suddenly disrupted when a hacker joined and shared obscene adult content. This trend is now known as...

How COVID-19 is already impacting your IT infrastructure

As the world adjusts to life during a quarantine, here are 3 statistics that show COVID-19 is having a bigger impact on your IT infrastructure than you thought:

Back in “normal times,” only 2.9% of the total U.S. workforce worked from home at least half of the time (based on a 2017 report*). Although the exact number is hard to pinpoint, a new poll says that 88% of organizations are estimated to...

Is your IT department coronavirus-proof?

Traditionally, we think of Disaster Recovery as a way to combat things like physical calamity, data loss, and criminal acts, but what if something happens to your IT manager? Are you prepared? By identifying problems before they happen, and putting a plan in place, you can position your business to tackle every obstacle.

Many businesses use the “bus test” as an extreme What if. What if a key employee gets hit by...

6 tips for remote employees

As companies respond to the global demand for remote work options, staying secure at home is crucial. Whether you’re provisioning corporate laptops or letting your employees use their personal devices, here are some things to consider:

Church Security Management Challenges

House of worship (or church) business operations, regardless of specific religion, are challenging across the board; and security management is no exception. Unlike corporate America where managers have the option to screen new hires and evaluate resources solely on performance, most church teams and committees are comprised primarily of volunteers; security teams included. Security managers operating in a church ecosystem are faced with needing to protect assets without...

Managed Physical Security

Physical security is justifiable for nearly every business today. Across the United States, employees assume a baseline level of security in the workplace, and with a seemingly endless number of liabilities, it’s simply not possible for employers to be too careful. However, it’s the vast minority of organizations globally who can afford (or justify) dedicated security management personnel who intimately understand the security technology the organization has...

Security Industry Disruptors – Two Dynamics to Watch

The physical security industry has exploded over the past decade. Acceptance of traditional IT industry conventions in the early 2000s brought more rapid product development than we had ever seen before; development that has empowered us to realize unprecedented reach from the technology and processes we’re implementing today. Surrounded by an ever-changing threat landscape, it’s necessary that the industry constantly evolves. In the midst of this evolution,...

12345