Protect more than data — protect your firm’s identity

Protect more than data — protect your firm’s identity

Data Protection In this column, we often discuss various means for businesses to protect their own assets. For small businesses especially, it might be easy to imagine assets only as tangible entities: money, employees, equipment and so forth. But what about...
What to know if you want to use spyware on employees

What to know if you want to use spyware on employees

With the presence of computers and smartphones reaching an all-time high in our society, it has never been easier to discreetly monitor a person’s activities without their knowledge. The question has evolved from “Is it possible to compromise a phone or computer with...
Smart TV product for seniors worth a look

Smart TV product for seniors worth a look

For Part 2 of our “human assets” series last month, we examined a few computers specifically designed for the elderly: specialized Linux machines that offered a few simple web apps with large print and a simplified user interface. While these machines can be useful...
A laptop with company data is stolen. Now what?

A laptop with company data is stolen. Now what?

My client was in a panic. It was a Friday and I had just wrapped up a case when the phone rang. “I need to get my laptop back,” he said, conversational formalities left at a minimum. “It has everything. All my company files, all my passwords. Everything.” The man’s...