Sensitive Data

BYOD

Bring Your Own Device: How To Establish A BYOD Business Policy

A BYOD policy is a great way to save company money by allowing employees to use the information-sharing and data-storing devices with which they are already com

Continue Reading
The Office Copy Machine

Another Identity Theft Risk – The Office Digital Copier

Nearly every digital copier built since 2002 contains a hard drive – like the one on your personal computer – storing an image of every document copied, scanned, or emailed by the machine.

Continue Reading