Protect more than data — protect your firm’s identity

Protect more than data — protect your firm’s identity

Data Protection In this column, we often discuss various means for businesses to protect their own assets. For small businesses especially, it might be easy to imagine assets only as tangible entities: money, employees, equipment and so forth. But what about...
What to know if you want to use spyware on employees

What to know if you want to use spyware on employees

With the presence of computers and smartphones reaching an all-time high in our society, it has never been easier to discreetly monitor a person’s activities without their knowledge. The question has evolved from “Is it possible to compromise a phone or computer with...
Smart TV product for seniors worth a look

Smart TV product for seniors worth a look

For Part 2 of our “human assets” series last month, we examined a few computers specifically designed for the elderly: specialized Linux machines that offered a few simple web apps with large print and a simplified user interface. While these machines can be useful...
Protecting human assets (Pt. 1): Phones for Kids

Protecting human assets (Pt. 1): Phones for Kids

Part 1 of a 2 Part Series Safeguarding Kids Each month in this column, we explore ways to safeguard things that are important to you: your assets. Usually, we focus on intangible assets like your credit card number, your identity and company trade secrets. But when...