https://www.pcx.net/wp-content/uploads/2018/09/PCX_phishing_FeatImg.jpg 266 692 multipage /wp-content/uploads/2017/05/pcx-logo.png multipage2018-08-30 00:00:042018-08-30 13:50:26The complete guide to phishing attacks
Discover what phishing attacks are and how these cybersecurity threats can damage your small business. Also, learn seven simple and effective ways to keep these malicious email campaigns at bay, including using training, email encryption and antivirus programs.
https://www.pcx.net/wp-content/uploads/2018/08/shutterstock_140452903.jpg 266 702 multipage /wp-content/uploads/2017/05/pcx-logo.png multipage2018-08-27 15:38:572018-09-11 15:05:105 things your employees need to know to stop data loss
Data loss is always a hard thing for companies to deal with. Luckily it is very easy to prevent. Some solutions are as simple as using surge protectors, keeping antivirus and other security software updated, and educating employees about security risks.
https://www.pcx.net/wp-content/uploads/2018/07/shutterstock_590498048.jpg 266 702 multipage /wp-content/uploads/2017/05/pcx-logo.png multipage2018-08-09 15:55:132018-07-10 14:01:21The 4 things you need for password security
Many cyberattacks are only successful because companies fail to encourage employees to create, store and manage passwords the right way. SMB owners would be wise to close the password security gap. Here are 4 steps that all employees should follow to ensure they are maximizing their password security.
https://www.pcx.net/wp-content/uploads/2018/06/PCX_IT_BYOD.jpg 266 692 multipage /wp-content/uploads/2017/05/pcx-logo.png multipage2018-06-22 00:00:052018-06-22 15:14:18Build your own BYOD policy
Are you struggling with employees bringing their own devices to work? Get step-by-step instructions for creating a BYOD ("bring your own device") policy. These are the best practices for creating a BYOD policy, including acceptable use policy and BYOD wipe policy if a device is lost or stolen.