Policy allows staff to understand the expectations of their employer and provides direction with regards to protecting their company, other [...]
About Mitch SmallThis author has not yet filled in any details.
So far Mitch Small has created 36 blog entries.
Many companies implement elaborate and effective security policies to protect from a “perimeter breach” the network in effect, but neglect to implement [...]
Myth 1: You Still don't know what the cloud is. Yes you do, most likely. Some of the cloud technologies that the majority of businesses have used at some stage [...]
A disaster recovery plan (DRP) - sometimes referred to as a business continuity plan (BCP) or business process contingency plan (BPCP) - describes how an organization is to deal with [...]
Posted on April 8, 2013 by Essential Data Services Whether youaE
As mobile devices continue to expand to the point where there will soon be more smartphones than people on Earth, the need for better collaboration between people and devices grows [...]
Choosing the right help desk support is critical to your business. When examining the options, you really must do your due diligence, to ensure you are partnering with a solid [...]
Your data really isn't safe unless you're backing up properly and with lots of redundancy. The computer backup rule of three, also known as the Backup 3-2-1 rule, can help [...]
It is increasingly the case that employees are using their own technologyaE"hardware, services and even applicationsaE"while on the job. This has become known as the aEoeconsumerization of IT,aE