by support@consta.link | Mar 20, 2018 | Uncategorized
Osterman Research shares why your ex-employees could be your next big security threat What happens when an employee leaves your company? If you’re like many small and medium-sized businesses, you’ll collect their laptops and IDs and then quickly work towards filling...
by support@consta.link | Mar 20, 2018 | Uncategorized
Optimizing and troubleshooting Outlook for Mac OS X I’m a Mac user. And Outlook for Mac makes me sad. That’s because, when compared to its Windows counterpart, Outlook for OS X (aka Outlook 2011) is an underperformer. Maybe it’s because the Windows version was built...
by support@consta.link | Mar 20, 2018 | Uncategorized
What healthcare companies can learn from Anthem’s data breach If you’ve followed the news behind Sony, JP Morgan and other highly publicized breaches, you’ll notice that this latest Anthem breach follows a very familiar trend. Corporate IT systems are fighting a...
by support@consta.link | Mar 20, 2018 | Uncategorized
How to generate a strong password that’s easy to remember In the movies, the bad guys pound furiously on a keyboard while techno music blasts and Matrix-style code flashes across their screens. In reality, the bad guys just launch dictionary tools on high-powered...
by support@consta.link | Mar 20, 2018 | Uncategorized
Massive password hacks: How SSO makes it easier to cope On Tuesday, a U.S. security firm uncovered that a group stole 1.2 billion Internet user credentials in what is being called the largest security breach in recent history. If you’ve seen the news coverage of this...
by support@consta.link | Mar 20, 2018 | Uncategorized
Upgrade to IP: Using Technology to Do More for Your Business As a business owner, you understand the importance of keeping your business software programs current with the latest updates and upgrades in order to keep your company competitive. But how long has it been...