by Performance Connectivity | Feb 27, 2019 | Best Practices, Compliance, Cyber Security, Mobilization
Implement a mobile device policy. This is particularly important if your employees are using their own personal devices to access company e-mail and data. If that employee leaves, are you allowed to erase company data from their phone? If their phone is lost or...
by Performance Connectivity | Jan 21, 2019 | Cyber Security, Mobilization, News
On January 17th, Twitter released a statement acknowledging a security flaw impacting Android users. Users who updated the email address associated with their account from November 14, 2018 to January 2019 may have had their private messages exposed. The...
by Performance Connectivity | Oct 24, 2018 | Best Practices, Cloud Computing Technologies, Compliance, Cyber Security, Mobilization
Technology is an inextricable part of business in today’s world. The best businesses stay at the forefront of tech and are mindful of the important role it plays in their daily operations and overall success. To do right by your business, accept these following...
by Performance Connectivity | Oct 3, 2018 | Cloud Computing Technologies, Compliance, Cyber Security, Mobilization, Remote Access Solutions
There are several misconceptions about mobile phones that can ultimately compromise user data. Check out our list below of the 5 most common myths people have about cell phones to learn how to best protect your data. You don’t need to install all the latest updates A...
by Performance Connectivity | Aug 22, 2018 | Cyber Security, Disaster Recovery Solutions, Mobilization, Remote Access Solutions
We’re all guilty of it: connecting to free public WiFi. Whether it’s at the coffee shop, hotel or airport, the temptation to check e-mail and surf the web is just too strong to resist. So BEFORE you connect to any free, public WiFi, make sure the connection is...