Filter by

Blog
|
4 min read
Beware the Security Risks of "Free" Websites
One great result of modern technology is that its easier than ever to set up a website. 25 years ago, you would need a ...
Read More

Blog
|
5 min read
Tips on Preventing an Advanced Email Spoofing Attack: An Interview with Ste...
While a spam email may occasionally trick your city employees, its safe to say that normal spam emails are full of red ...
Read More

Blog
|
4 min read
7 Reasons City Employees Should Not Use Unapproved Software
In the news, weve seen plenty of times when government employees get into a lot of trouble by using software thats not...
Read More

Blog
|
3 min read
Ways to Lock Down and Prevent Unauthorized Physical Access to Technology
In the world of bits and bytes, the act of stopping hackers and preventing unauthorized access to data can seem like the...
Read More

Blog
|
3 Min Read
The Top 5 Must-Haves in a BYOD AUP for CPAs
We're sharing the 5 primary concepts your BYOD AUP should include and why is each relevant to your workplace.
Read More

Blog
|
3 Min Read
3 Foolproof Data Security Policy Tips for Your Accounting Firm
Here are three ways you can get your team to improve their awareness and execution of data security for electronic files...
Read More