[section background_color=’#f2f2f2′ background_repeat=’repeat’ background_size=’off’ heading_color=’#4258a4′ color=’#5e5e5e’ parallax=’off’ padding=’60px 0′ ]
[boxed]
[center]
Try Our FREE Security Kit
Do You Want to Improve Your Business Network Security?
Part of our proactive network management is offering you and your employees information every month on the steps you can take to prevent attacks. Our security kit provides you with the information you need to be smart with your technology’s security.
[/center]
[/boxed]
[/section]
[section background_color=’#ffffff’ background_repeat=’repeat’ background_size=’off’ heading_color=’#4258a4′ color=’#5e5e5e’ parallax=’off’ padding=’60px 0′ css_class=’securitykit’]
[boxed]
[center]
[row]
[column col_sm=’6′ col_md=’3′ ]
Phishing
Learn nine ways to identify a phishing scam and to protect your business.
[/column]
[column col_sm=’6′ col_md=’3′ ]
Network Security
What To Do If You Think Your Business Network is on the brink of a security breach.
[/column]
[column col_sm=’6′ col_md=’3′ ]
Can-Spam
There are a few guidelines that your business can follow to ensure that your email marketing promotion remains compliant.
[/column]
[column col_sm=’6′ col_md=’3′]
Ransomware
How to identify and stop emails infected with Ransomware and Cryptolocker.
[/column]
[/row]
[su_spacer size=”50″]
[row]
[column col_sm=’6′ col_md=’3′ ]
Email Security
Identifies Emails That May Have Malicious Code That Includes Viruses, Worms and Trojan Horses.
[/column]
[column col_sm=’6′ col_md=’3′ ]
Encryption
Let us “decrypt” encryption for you, by taking it out of the spy movies and into your office.
[/column]
[column col_sm=’6′ col_md=’3′ ]
GLBA
Learn what about the Gramm-Leach-Bliley Act and why it should matter to you?
[/column]
[column col_sm=’6′ col_md=’3′ ]
Physical Security
We’ve taught you how to protect private data from hackers, but what about prying eyes around the office?
[/column]
[/row]
[su_spacer size=”50″]
[row]
[column col_sm=’6′ col_md=’3′ ]
PCI
Learn how to protect your credit card information with these twelve steps.
[/column]
[column col_sm=’6′ col_md=’3′ ]
Password Security
Let us help you fix all of the common mistakes and make it easier for you to remember all of those pesky passwords.
[/column]
[column col_sm=’6′ col_md=’3′ ]
BYOD
Should you allow your employees to bring their own devices to work? Learn about the risks and benefits.
[/column]
[column col_sm=’6′ col_md=’3′ ]
HIPAA
Does HIPAA apply to you? Let’s find out by asking the important questions.
[/column]
[/row]
[/center]
[/boxed]
[/section]