Kevin Howarth
Filter by
Blog
|
4 Min Read
Key Considerations for Developing a Mobile Device Policy
BYOD means new thinking for both companies and employees, including new approaches for security, new ways to manage appl...
Read More
Blog
|
3 Min Read
Cybersecurity Awareness: Enable Multi-Factor Authentication
Multi-Factor Authentication blocks 99.9% of all attacks. This is exactly how MFA works. There are three main types of MF...
Read More
Blog
|
2 Min Read
The Importance of Municipal Employee Security Awareness Training
When it comes to securing your municipality's data and information, relying on firewalls, antivirus software, and secure...
Read More
Blog
|
3 Min Read
IRS Releases New Data Security Plan to Help Tax Professionals: What You Nee...
Are you up to speed with the new IRS requirements for data security? The Security Summit, a partnership between the IRS,...
Read More
Blog
|
5 Min Read
Why Multi-Factor Authentication Is Essential
How can you better protect your organization's sensitive information and your users' personal data? Deciding where to fo...
Read More
Blog
|
4 Min Read
The Value of Information: Why Security is a Required Business Capability
Many business leaders continue to believe they’re not a target for cybercriminals because they don’t have anything that ...
Read More