AllConnected Blog

4 Ways to Boost Productivity and Security in Your Remote Workforce: Security, Comliance, Collaboration Tools, Other WFH Solutions - Microsoft 365, Citrix, Webex
AllConnected News
Mariah Prendergast

Top 5 WFH Security Policies You Need to Implement

We’ve all been figuring out how to effectively work from home for almost a year. Now it’s time to think about how to keep your remote workforce as secure as possible so your organization can remain productive. Join our webinar to learn how.

Read More »
CPA
Events
Brennan Smith

Safeguarding Taxpayer Data Webinar

The Safeguards Rule requires companies to develop a written information security plan that describes their program to protect customer information. Prepare with AllConnected’s Safeguarding Taxpayer Data Webinar…

Read More »
NCSAM October 2020 - Do Your Part, Be Cybersmart
National Preparedness Month
Brennan Smith

National Cybersecurity Awareness Month – October 2020

The National Cyber Security Alliance (NCSA) and the U.S. Department of Homeland Security (DHS) launched National Cybersecurity Awareness Month (NCSAM) in October 2004 as a broad effort to help all Americans stay safer and more secure online.

Read More »
fire rescue
Disaster Recovery
Mariah Prendergast

DRaaS: Misconceptions of Data Backup and Data Recovery

There are many players in the data protection, backup and recovery space, many who claim to provide a “DRaaS” service, but not many provide for all aspects you should expect in a Disaster Recovery Solution.

AllConnected believes you should have the facts so you can make an informed decision.

Regardless of what business you run, your Disaster Recovery plan begins with backup.

Read More »
Multi-factor authentication: something you know, something you are, something you have
AllConnected News
Mariah Prendergast

How Secure Is Your Multi-Factor Authentication?

Thanks to organizations like FIDO Alliance, authentication has become more sophisticated. Now, instead of yet another piece of information (like a pin or social security number), authentication is determined by the use of more than one factor, simply classified as “what you know”, “what you have,” or “what you are.

Read More »