Technology Insights

Technology Insights2019-04-05T14:53:32+00:00

“Smishing” Endangers Your Security…Via Text

By |February 3rd, 2019|Categories: Security|Tags: , |

Any time you receive a text, remember to think before you tap. Texts are used for identity theft, bank account take-overs and to acquire personal or company confidential information. Read on for tips of how to spot red flags.

Comments Off on “Smishing” Endangers Your Security…Via Text

Introducing Haven: Measure. Monitor. Control.

By |April 24th, 2017|Categories: Applications|Tags: , , |

The solution to the paper sign-in sheet, the nice-but-probably-unnecessary receptionist, and the awkward business card exchange: Haven, a visitor access management system. We've developed a sign-in process that's unobtrusive and convenient for visitors while providing increased awareness and monitoring of your campus.

Take Control of your Personal Online Security

By |March 16th, 2017|Categories: Security|Tags: |

Your personal data is everywhere on the internet. It's necessary to utilize the services you rely on daily; your Gmail, Twitter, and Amazon accounts are all associated with your name, email, password, and phone number (not to mention credit card information for online shopping). But the very data that's stored with your online account can leave you open to exploitation when one of your favorite online sites experiences a data breach.