Fun and Games…
In this issue:
- Double Dare You!
- Videoconferencing: Be the Center Square
- And the Password Is…
- Three Ways to Wipe Out PC Slowness
Fun and Games…
In this issue:
One of IT Radix’s newest clients is an innovative specialty chemicals and natural materials provider. They manufacture high-quality materials used in the personal care, industrial and food/nutrition industries. Having up-to-date technology as a key driver of business efficiency and productivity is important to them.
Quick Tip: Check before you download.
Why? So you have a big file you need to get over to your printer YESTERDAY and you can’t get it to “send” via email because the file is too big. What should you do? The right thing to do is contact your IT department (us!) so we can assist by installing a secure, commercial-grade file-sharing application.
We just welcomed another growing Marketing and PR firm into the IT Radix client family. This exciting firm offers a full range of public relations and other marketing services to a host of major firms in the pharmaceutical and other industries. Communications strategists and problem solvers, this agency has grown and as has their reliance on technology.
If your PC or network is breached, you have to beat the clock to avoid catastrophe. Do you remember the TV game show, Beat the Clock? That show debuted in 1950 and has run in various forms right through 2003. Unlike that fun game, there is no prize to win when a security issue arises in your network.
HOST: Hello again everyone and welcome to To Tell the Truth! Today we have three contestants each who is prepared to tell us the key reason why organizations today should have a system for archiving email! Contestant #1…
CONTESTANT #1: I have a law degree and I can tell you that clearly the most important reason to archive email today is for the purposes of Regulatory Compliance.
Quick Tip: Make security a habit, through Security Awareness Training and Testing.
Why? With so many access points, from cell phones to laptop and home computers, how can anyone hope to keep their network safe from hackers, viruses and other unintentional security breaches? The answer is not “one thing” but a series of things you have to implement and constantly be vigilant about, such as installing and constantly updating your firewall, antivirus, spam-filtering software and backups.
Do you realize that your Microsoft Word document may contain hidden and personal information that you may not want to share with others? Confidential information is stored in the document properties or document itself (e.g., comments from reviewers, revision marks from tracked changes, details about the author, date when a document was created, headers, footers and hidden text).
When sharing electronic copies of Microsoft Word documents, it is a good idea to remove this metadata before sharing with others.
Fun and Games…
In this issue:
Quick Tip: Get serious about IT security awareness and employee security training.
Why: This is what every hacker hopes you believe: “We’re small…nobody wants to hack us.” This is the #1 reason why people (companies) get hacked. They dismiss the importance of IT security because they’re only a “small business.