Password Strength is Key in Business and Personal Information Security

mouse-creditcardIn today’s technologically driven business marketplace one of most often overlooked points of vulnerability to your business and personal information security is the strength or weakness of the passwords that you define for usage when logging into: your computer network, email provider, online banking, and accounting or payroll applications. To underestimate the importance of strong passwords is to leave the door wide open to identity theft and corporate piracy. Your passwords must be a robust combination of all the characters that are available, must be unique for different applications and must not be a word commonly found in any dictionaries, in any language. Read more

The Importance of Communication, Messaging, and Collaboration in the Workplace

Business teamWith so much technology and messaging and collaboration solutions at our fingertips, it is sometimes difficult for us to believe that any communication problems exist in business today. In the course of a busy workday, the importance of good communication can be easily forgotten. If you are noticing that it is difficult to get your employees to work together cohesively, that morale is very low, or worse, that your business is losing money, you might need to take a second look at your company’s communication style and practices. Let’s take a look at some common communication methods and how they impact particular situations. Read more

Why Your Company Needs an Internet Use Policy

InternetUsePolicyGiven that computers and Internet access have become such an integral part of every business, and that the Internet offers everything from gambling to X-rated websites, it is critical that every business has an Internet Use Policy in place. This policy can help prevent your employees from accidentally or intentionally causing harm to your company or your company’s reputation. While you don’t want to give your employees the idea that they are living in George Orwell’s 1984, you want them to have a clear understanding of practices that are and are not appropriate during work hours. It is necessary for companies to create an Internet policy that everyone can live with, and this will be different for every business, depending on their unique culture, business practices, and needs. Read more

Do You Allow Employees To Use Their Own Devices For Work?

The evolution of personal mobile devices and the rise of how necessary they are to business success these days are forcing many small business owners to make a choice – “Bring Your Own Device” (BYOD) vs. “Corporate Owned, Personally Enabled” (COPE).

The Typical Solution – BYOD. According to the CDW 2012 Small Business Mobility Report, 89% of small-business employees use their personal mobile devices for work. But the headache involved here is how do you support and secure all of these devices? The scary thing is that most small businesses don’t even try!  The CDW survey found that only 1 in 5 small businesses have deployed (or plan to deploy) any systems for managing and securing employees’ personal devices.August-Image

The Alternative – Is COPE Any Better? A minority of small businesses has implemented a Corporate Owned, Personally Enabled (“COPE”) policy instead. They buy their employees’ mobile devices, secure them, and then let employees load additional personal applications that they want or need. And the employers control what types of apps can be added too. And the “personally enabled” aspect of COPE allows employees to choose the company-approved device they prefer while permitting them to use it both personally and professionally. COPE is certainly more controlled and secure, but for a business with a limited budget, buying devices for every employee can add up pretty quick. If you go the COPE route and are large enough to buy in volume, you can likely negotiate substantial discounts.

Security Concerns With BYOD. If you have client information that must be kept secure or other industry specific regulations regarding the security of client data, then COPE is likely your best approach. It takes out any gray area of whose data is whose. Plus there is a certain comfort level in being able to recover or confiscate any device for any reason at any time to protect your company without any worries of device ownership.

Struggling to figure out which option is best for your business?  Our FREE Mobile Device Policy Consultation ($297 value) helps point you in the right direction for your business.