Skip to content

[section background_color=’#f2f2f2′ background_repeat=’repeat’ background_size=’off’ heading_color=’#4258a4′ color=’#5e5e5e’ parallax=’off’ padding=’60px 0′ ]
[boxed]
[center]

Try Our FREE Security Kit

Do You Want to Improve Your Business Network Security?
Part of our proactive network management is offering you and your employees information every month on the steps you can take to prevent attacks. Our security kit provides you with the information you need to be smart with your technology’s security.
[/center]
[/boxed]
[/section]

[section background_color=’#ffffff’ background_repeat=’repeat’ background_size=’off’ heading_color=’#4258a4′ color=’#5e5e5e’ parallax=’off’ padding=’60px 0′ css_class=’securitykit’]
[boxed]
[center]
[row]
[column col_sm=’6′ col_md=’3′ ]
phishing

Phishing

Learn nine ways to identify a phishing scam and to protect your business.
[/column]

[column col_sm=’6′ col_md=’3′ ]
network

Network Security

What To Do If You Think Your Business Network is on the brink of a security breach.
[/column]

[column col_sm=’6′ col_md=’3′ ]
canspam

Can-Spam

There are a few guidelines that your business can follow to ensure that your email marketing promotion remains compliant.
[/column]

[column col_sm=’6′ col_md=’3′]
ransomware

Ransomware

How to identify and stop emails infected with Ransomware and Cryptolocker.
[/column]
[/row]

[su_spacer size=”50″]

[row]
[column col_sm=’6′ col_md=’3′ ]
email

Email Security

Identifies Emails That May Have Malicious Code That Includes Viruses, Worms and Trojan Horses.
[/column]

[column col_sm=’6′ col_md=’3′ ]
Encryption

Encryption

Let us “decrypt” encryption for you, by taking it out of the spy movies and into your office.
[/column]

[column col_sm=’6′ col_md=’3′ ]
glba

GLBA

Learn what about the Gramm-Leach-Bliley Act and why it should matter to you?
[/column]

[column col_sm=’6′ col_md=’3′ ]
physical

Physical Security

We’ve taught you how to protect private data from hackers, but what about prying eyes around the office?
[/column]
[/row]

[su_spacer size=”50″]

[row]
[column col_sm=’6′ col_md=’3′ ]
pci

PCI

Learn how to protect your credit card information with these twelve steps.
[/column]

[column col_sm=’6′ col_md=’3′ ]
passwords

Password Security

Let us help you fix all of the common mistakes and make it easier for you to remember all of those pesky passwords.
[/column]

[column col_sm=’6′ col_md=’3′ ]
byod

BYOD

Should you allow your employees to bring their own devices to work? Learn about the risks and benefits.
[/column]

[column col_sm=’6′ col_md=’3′ ]
hipaa

HIPAA

Does HIPAA apply to you? Let’s find out by asking the important questions.
[/column]
[/row]
[/center]
[/boxed]
[/section]