Is It Time to Review Your Email Compliance Policies?

It is becoming ever more difficult for organisations to keep their heads buried in the sand when it comes to email retention, and this applies to enterprises of all types and sizes. It might seem to be a chore that distracts from the real purpose of the business, but the penalties of failing to adhere… Continue reading Is It Time to Review Your Email Compliance Policies?

Three Things To Consider When Planning Disaster Recovery

Given the importance of technology in how many businesses, hospitals and other organizations operate, it’s essential that disaster recovery best practices are utilized. Throughout the years, we’ve learned the effects of manmade and natural disasters on different businesses’ operations. Major events like Hurricanes Sandy and Irene as well as wildfires in the Pacific, blizzards in… Continue reading Three Things To Consider When Planning Disaster Recovery

Virtual Data Rooms: What Are They and When Do You Need One?

Since the invention of mainframe computers, technology and business has gone hand in hand. With the increased stability, lower costs, and ease of access of the internet, more businesses have taken a look at virtual business options. One of these options that are changing the way business is conducted is the virtual data room. Often… Continue reading Virtual Data Rooms: What Are They and When Do You Need One?

Developing a Security Program

Have you ever heard the statement, “Networks evolve”? Ask any System Administrator whether they think this statement has merit and most will agree. The company grows, and one server turns into two which turns into ten; or, one location turns into five, and before you know it, your network has evolved into its own entity. This post is intended to give you examples and provide reasons why a sound security plan is so important. The following will provide you with an outline for how to develop and implement a security program for your organization and/or clients.