
Considering the nature of the data they deal with on a daily basis, it really is no surprise that auto dealerships have to uphold a variety of stringent data security standards based on the requirements of assorted regulations. Let’s explore these standards and review what they will require you to do.
Mobile devices demand a special type of attention in order to ensure security. You want to ensure that your devices are protected as well as possible, but you also need to ensure that this does not come at the expense of your employees’ productivity or efficiency. We’ve put together a list of common security issues...
More than likely, the majority of your staff all have smartphones and other mobile electronic devices that they use personally, and often use for their work. From meeting notes taken on a personal laptop to checking work email on a personal tablet, if these devices aren’t kept in check, sensitive business information gets passed around...
Backups used to be pretty straight forward, started with tapes and boy I don’t miss those days. We later evolved to external hard drives and we would either use the backup solution built into the server environment or buy at the time a more robust solution. It was easy back then, usually all of your...
The cloud. It seems that is all we hear about these days, and for good reason, with its amazing up time and stability it seems like a no brainer to go with the cloud. However, there are still certain applications and services that need to be hosted locally. The sad fact is many find themselves...
Gmail is adding functionality to email that will help catch it up to the 21st century We’ve spoke about it before; the difference between IMAP and POP email protocols, and as of June 24th, 2014, Google is revolutionizing the way that we communicate via email. The technology that we use in email now (IMAP), was...
The question seems fairly straightforward, why use Gmail over any POP email services? The best place to start is to differentiate between the different emails protocols, or how we receive, store and access our messages. Email Protocols “THE DOWNFALL TO POP MAIL IS THAT IF YOU LOSE YOUR PHONE OR YOUR COMPUTER CRASHES, YOUR...