As every good Stars Wars fan is well aware, May 4th is Star Wars Day (May the fourth be with you). As an IT company, we love all technology, especially tech from a long time ago in a galaxy far far away. Therefore, let us take a moment and look at the most famous technology from Star Wars, Darth Vader.Last modified on Continue reading
Last modified on
With all the attention that hackers receive, you would think that they are solely responsible for every network security breach, but the truth of the matter is that most damages to company networks are due to negligence. Here are the four most common IT security oversights that can lead to major damages to your network.
This week, Microsoft will be releasing critical security patches for Windows, Office, Internet Explorer, and SharePoint Server. Updating software is something Microsoft does routinely; however, users should pay attention when critical patches are released because they are,well, critical.Last modified on Continue reading
Emotions aside, whenever an employee is fired or quits, their departure means extra paperwork for Human Resources. After the farewell cake has been cleaned up, the exit interview has been completed, and all the resignation forms have been filed, it is now vital that the former employee's access to the company's network be completely removed.Last modified on Continue reading
How confident are you that the e-mail you send will only be seen by the individual that you are sending it to? What is to prevent someone from forwarding or copying your message? In Microsoft Outlook, there is a security feature called Information Rights Management (IRM) that you can use to secure Microsoft Office files sent via Outlook.Last modified on Continue reading
Feedback & Suggestions
Is there a topic or feature you would like included in a future issue? Opinions and feedback are welcome and encouraged. Send me an e-mail!