A data retention policy graphic showing 3 file folders with hour glasses and a trash can.

Data Retention Policy: What It Is and How to Create One

A data retention policy guides what data should be stored or archived, where that should happen and for how long. Download a free data retention template to get started ... Read More
Total Cost of Ownership: Why It’s Important for Businesses

Total Cost of Ownership: Why It’s Important for Businesses

A total cost of ownership (TCO) analysis is vital to examine the financial impact of implementing new technologies in business. In information technology, assessing the TCO provides a broader view of the investment and the value of the product over its lifespan ... Read More
Types of Cyber Attacks: A Closer Look at Common Threats

Types of Cyber Attacks: A Closer Look at Common Threats

By understanding the different types of cyber attacks and how they are executed, you can identify potential threats and take the required steps to prevent them if a cybersecurity event occurs ... Read More
Setting up Google Backup and Sync

Google Backup and Sync: Is It Really Backup?

| | Backup, Cloud Technology, G Suite
The Google Backup and Sync app (for personal use and Drive File Stream for businesses) is the replacement for Google Drive and Photos desktop apps for Windows PCs and Macs. Learn how to use it and if it's really a viable "backup" option ... Read More
Prevent ATO Attacks During the COVID-19 Pandemic

Prevent ATO Attacks During the COVID-19 Pandemic

Office 365 and G Suite administrators need to ensure SaaS data protection during COVID-19 and prevent dark web cybercriminals from deploying Account Takeover (ATO) attacks ... Read More
A Guide to Telecommuting: Adjusting to the New Era of Remote Working

A Guide to Telecommuting: Adjusting to the New Era of Remote Working

Welcome to the new world of telecommuting - the COVID-19 pandemic edition. Learn how to navigate through the world of working from home — especially if you are a first-timer ... Read More
FERPA Compliance icon.

FERPA Compliance & How to Obtain It

| | Compliance, education
Learn what the Family Educational Rights and Privacy Act (FERPA) is and what measures educational institutions must take to obtain FERPA compliance ... Read More
OneDrive vs. Google Drive: Which Cloud Storage is Better?

OneDrive vs. Google Drive: Which Cloud Storage is Better?

Learn the pros, cons and differences between Microsoft OneDrive and Google Drive to help you pick the right cloud storage option ... Read More
Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon

Zero-Day Vulnerability: The Unknown Threats to Your Data

Zero-day vulnerabilities lead to zero-day exploits that put your data at risk. Learn how to keep your Office 365, G Suite and Salesforce data protected from such attacks ... Read More
AES Explained (Advanced Encryption Standard) - Computerphile

AES Encryption: A Closer Look at Advanced Encryption Standards

AES (Advanced Encryption Standard) is the gold standard when it comes to protecting your SaaS data. Take a deep dive into what makes AES the most secure encryption cipher out there ... Read More