In 2016, security will continue to be a priority for all businesses. Other interesting tech trends include an increase in the number of companies that allow BYOD (bring-your-own-device), the return of the stylus (who would have thought?), and possibly even the demise of the traditional password (hard to imagine).
Do you know what to look for to determine if an email is “suspicious”? Hackers have become very clever by creating emails that look legitimate, especially at a quick glance. Unfortunately, you could make one wrong click in an email and expose your entire network to a serious breach.
Creating strong, unique passwords is one of the best defenses we have against cyber criminals. However, it can be a challenge to come up with a new password every time we sign in to a new account. At CRU Solutions, some of us have over 50 password-protected accounts. Do you know how many passwords you use?
The odds of businesses of all sizes being reviewed by Microsoft for licensing compliance has increased. Since the beginning of 2015, 12% of CRU clients have received Microsoft review requests, and we expect that number to grow. Microsoft plans to conduct these reviews with customers every 2-3 years.