The Source Newsletter Header July 2018

The Basics: Passwords by Kate Pace We’ve said it before and we’ll say it again, and again, and again. Choose complex passwords, that vary across your critical accounts, and change them at least annually. Take a minute to think about the passwords you use for your financial logins, your email, and your work accounts. How many of them are similar? How many of them have changed in the past 6 months? How many of you keep a little black book to log all the cryptic revisions to your family’s account passwords over the years? Based on what we know today, it’s due time for theRead More →

Three trends transforming the modern workplace

used with permission from Microsoft in Business Blog Advances in technology and shifting workforce demographics are creating a more fluid work environment, redefining what productivity looks like, and empowering individuals to work smarter. With an influx of new talent that values experiences, continued learning, and collaboration over financial compensation, leadership will have to take a forward-looking approach to restructuring the workplace landscape. Innovative technologies can help all organizations respond to workplace trends and create dynamic environments that incentivize and empower the next generation of employees. Encouraging and accommodating remote workers In the modern workforce, out of sight doesn’t mean out of mind. Modern businesses areRead More →

Non-Technical Security Tips

You don’t need to be a tech expert in order to master security practices to keep your sensitive data safe. Here are three quick tips for improving security in your office. 1. Keep a clean desktop. At the end of every day, organize your desk, remove unnecessary papers and items, and lock documents with sensitive information (like client information and account numbers) in a drawer. 2. Shred documents before throwing them away. Make use of your office’s paper shredder and make sure to thoroughly destroy any documents that have sensitive information before putting them in the trash. 3. Run anti-virus and anti-malware software. Make sureRead More →

The Source Newsletter June 2018

5 mobile threats you should shut down in 2018 used with permission from Tektonika (HP) Mobile devices are now a staple of the workplace, as ubiquitous as open floor plans and videoconferencing. Enabling employees to work from their mobile devices can even boost satisfaction, productivity, creativity, loyalty, and engagement—that’s quite a list of benefits. However, embracing these upsides also requires paying attention to the downside: mobile threats. Given the sheer volume and value of sensitive data on employee devices, mobile security needs to be an IT priority. Every time an employee accesses corporate data from a smartphone, they put the entire network at risk—unless properRead More →

Data Security Breach

used with permission from IBM Big Data & Analytics Hub by Seth Dobrin The 72-hour rule included in the European Union’s General Data Protection Regulation (GDPR) has become a major focus for businesses as they work towards compliance. Article 33 states that breaches must be reported to the regulator within a 72-hour window of an organization becoming aware of it, and to the data subject “without undue delay” after businesses become aware of the breach. What exactly constitutes “undue delay” will become clearer as the GDPR is applied in practice, but the thrust of the regulation is clear. The procedural implications for larger companies canRead More →