The Source Newsletter June 2018

The Source Newsletter June 2018

Mobile Threats

5 mobile threats you should shut down in 2018

used with permission from Tektonika (HP)

Mobile devices are now a staple of the workplace, as ubiquitous as open floor plans and videoconferencing. Enabling employees to work from their mobile devices can even boost satisfaction, productivity, creativity, loyalty, and engagement—that’s quite a list of benefits.

However, embracing these upsides also requires paying attention to the downside: mobile threats. Given the sheer volume and value of sensitive data on employee devices, mobile security needs to be an IT priority. Every time an employee accesses corporate data from a smartphone, they put the entire network at risk—unless proper security measures are in place.

Learn More

Data Security Breach72-hour rule: Can you identify and report a data breach within 3 days?

used with permission from IBM Big Data & Analytics Hub
by Seth Dobrin

The 72-hour rule included in the European Union’s General Data Protection Regulation (GDPR) has become a major focus for businesses as they work towards compliance.

Article 33 states that breaches must be reported to the regulator within a 72-hour window of an organization becoming aware of it, and to the data subject “without undue delay” after businesses become aware of the breach.

Read More

3D Printer

Could 3D printers be your next secret weapon?

used with permission from HP Tech@Work

3D printers offer small to midsized businesses an unprecedented opportunity to differentiate themselves in their markets and level the playing field with bigger brands.

3D printers may seem like tools only a big business might care about, but with recent technological advances and price reductions, SMBs should care as much or more than larger companies.

In fact, 3D printers now offer small to midsized businesses an unprecedented opportunity to differentiate themselves in their markets and level the playing field with bigger brands.

Read More

Windows 10 Tip: Choose a photo for your account

used with permission from Microsoft
by Elana Pidgeon

Today, we’re going to show you how to choose the picture you want to show for your account on the sign-in screen, Start menu, and more:

Simply select Start, Settings, Accounts and then Your info. Under Create your picture, select Browse for one.

Read More


Business Continuity Tip: Insider Threats to Your Security

We live in a connected world where we must share sensitive, identifying information regularly in exchange for services. If you’re accessing government or medical services, you’ll be sharing your PII (Personally Identifying Information). If you’re shopping, you’re sharing your credit card number. And so on! Safely transfering and storing sensitive data affects us all.

How you can you verify that you’re sharing and transferring sensitive data well? Follow these three steps:

  1. Verify the recipient. Don’t send to the wrong person!
  2. Verify the data. You don’t want to send the wrong data, even if it’s to the right person.
  3. Verify the method. Transfer data according to best practice or in line with your organization’s policies.

Monthly Quote

“Nothing contributes so much to tranquilize the mind as a steady purpose – a point on which the soul may fix its intellectual eye.”

— Mary Shelley

Systems Free Computer Network Health Check image
Free IT Checkup

The Sournce Newsletter June 2018

Systems Referral Program for Clients Frinds Colleagues
Refer a Friend or Colleague.