Password management is a common challenge businesses in any industry face. A shocking number of businesses still rely on paper-based logbooks or unsecured spreadsheets to manage their privileged account credentials. According to Forrester (a leader in business technology research and advisory) estimates that 80% of data breaches involve privileged credentials which means organizations must make password protection a top priority in their security strategies. Read more
Building your business website or embarking on a web redesign project includes several moving parts including scope definition, sitemap and wire-frame creation, content creation, user interface (UI) design among several other elements. Choosing the right web platform to build your website upon should balance the requirements of functionality, ease of use, price, customization needs and technical features. Quite commonly embarking on a web design project will lead most small businesses to choose from two popular web services: Squarespace or WordPress. Read more
When faced with the numerous hardware and software options available on the market today, understanding differences in warranty claims becomes an important part of decision making process. The procurement management process is without a doubt, a critical component to business success. When introducing hardware and software in the workplace, management of the procurement life-cycle will surely have effects on the office efficiency and security. It is essential to implement the right technology to see a real benefit, increase the productivity of your staff and ultimately see an increase in profitability. Read more
Encryption has become the most effective way for businesses of all sizes to best secure critical data. While it doesn’t prevent data from being accessible, it does render data unintelligible unless you have a secret key or password to decrypt or make the information readable.
With the introduction of Microsoft’s Windows BitLocker, business hardware (like servers, workstations, backup drives, etc.) can be protected by encryption; drastically improving the threat of data being stolen or exposed when a computer is lost or stolen. Encryption plays a significant role in data confidentiality on hardware and can be utilized in a variety of organizations including law firms, doctor office’s or businesses that supply laptops for employee’s use. Read more
In tough economic times, businesses tend to cut costs wherever possible. While it may be a necessary means to an end, strategies should be in place so that productivity remains unaffected. Since IT can often become a roadblock to productivity, we’ll have a closer look at how improving the quality of staff’s equipment can not only improve productivity but profitability as well. Read more
Data destruction is a legal obligation your business is responsible for managing appropriately. Legislation like PIPEDA requires your organization keep sensitive and private information of your clients, employees and partners from falling into the wrong hands. “Personal information that is no longer required to fulfill the identified purposes should be destroyed, erased, or made anonymous.” (PIPEDA, Principle 5.) Read more
Business owners operating in today’s landscape will commonly acknowledge the importance of backing up critical business data. With several media and seemingly complex methods available to choose from, the decision making process is often a daunting task when the concepts are beyond your area of expertise. Often times management will select the most inexpensive option as they are unable to truly comprehend the consequences associated with the selections presented to them.
As a trusted business adviser, we at Compulite choose to empower our clients with the knowledge needed to make important business decisions that will impact (either positively or negatively) their company. While some may find it difficult to grasp the technical components of a complex backup structure, the high-level details we’ve included throughout this post should give some insight into how your approach to backups can be structured. Read more
As technology advances and becomes more accessible, consumers and businesses alike are able to take advantage of more cost effective, feature-rich solutions not previously available to them. Geofencing and Geo-IP filtering for hardware and software used to be a very costly tool implemented for very specific use cases. It is now technology featured in almost every smart phone, firewall or router most consumers already have in their possession, and is the foundation of several applications and services. Read more
Contract management becomes more complex as your organization continues to grow. A scalable system needs to address the moving elements and personnel obligations intertwined with managing contracts. It should also increase efficiency and ensure compliance is met throughout the management process. Using a customizable solution like SharePoint as your contract management system (CMS), will make efficient use of your time when it comes to searching or compiling contract information. Read more
A “golden key” or a universal back door method, allows the bypassing of normal authentication in a product, computer system or algorithm. If used ethically it can be used for securing remote access to a computer system or for debugging purposes. The controversy surrounding golden key methodology stems from the fact that in the wrong hands, it can also open up physical access to those with malicious intent.
Major hardware manufacturers like Apple, Microsoft and Blackberry have taken publicly dissimilar positions on releasing universal back doors to their devices. As the world increasingly depends on devices supplied by these few suppliers, it is important to know where they stand, so you have an idea where your sensitive personal data is likely to end up. Read more