Archives - Small Business

Is a digital signature secure?

A digital signature—a type of electronic signature—is a mathematical algorithm routinely used to validate the authenticity and integrity of a message (e.g., an email, a credit card transaction, or a digital document). Digital signatures generate a virtual fingerprint that is unique to a person or entity and are used to identify users and protect information […]

Don’t allow unknown users into your online meeting

If there’s the potential for mischief on the internet, it’s almost certain someone’s going to take advantage of it. Such is the case with online meetings. There have been quite a few cases of bad actors trying to find their way into these meetings to disrupt them, often by displaying inappropriate or obscene content. This […]

Test your DKIM records

Domain key identified mail (DKIM) uses public and private keys to ‘sign’ an email you’re receiving. This often prevents messages from hitting spam or junk, and isn’t completely necessary. However, it’s worth adding DKIM verification to your email domain. Different providers have their own techniques for doing so, but once it’s up, send a test […]

Discover desktop-as-a-service

If you’re running a small-to-medium business, it might be prohibitively expensive to buy and send good hardware to your remote workforce. Desktop-as-a-service (DaaS) providers are here to fill the IT gap, though. They effectively upgrade a laptop or desktop machine with a virtual representation of your company network, whenever you require it. This is fantastic […]

Implement a “clean desk, clear screen” policy for employees

A clean desk policy involves removing any sensitive business information from your desk everyday. This can include USB sticks, notebooks, business cards and printed documents. Inadvertently leaving them out is an invitation to data theft, which could result in a serious breach of your business’ network. Add a ‘clear screen’ policy, so employees are required […]

Create fail safes for employee devices

If you have a bring your own device (BYOD) policy at work, make full use of mobile device management (MDM) applications so you can remotely access, track and wipe the data from a device should it be lost or stolen. High end MDM will also allow you to set regular automated data backups to your […]