Month

August 2011
Keeping your Organization Safe, One Mobile Device at a Time In this week’s article we address yet another budding security and safety concern. Our clients are always asking us to give them advice on whether personal mobile devices should be permitted on their Corporate Network. Although there is no simple answer to the question, we...
Continue Reading
In our latest feature we explore the value and importance for small to medium enterprise businesses of doing an IT Infrastructure Audit. A few years ago I was approached by COO of a financial services company to respond to a RFP to do an IT Infrastructure Audit for his business.  He had been appointed to...
Continue Reading
In today’s article we have directed our attention to hackers and the potential for electronic break-ins and corporate espionage.  We now live in a corporate environment “where we cannot survive without access to computer networks and we’re totally enslaved to the technological innovations and breakthroughs of today.” In zimbio.com one blog suggested that the incidence...
Continue Reading