Interfocus Blog

The Blessing and Curse of Workforce Mobility

Increased productivity means increased security risk For better or for worse, we take our computing devices everywhere. From the beach to the boardroom, we use our laptops to take notes, do research, watch cat videos, and stay in touch with our networks of friends and...
Ensure Your Remote Workforce Keeps Your Data Secure from Attacks

Ensure Your Remote Workforce Keeps Your Data Secure from Attacks

Be flexible with your staff without giving away the farm Most job seekers today are savvy shoppers—looking for the right employer with the right work and right benefits for them. Some are in pursuit of higher salaries, but, increasingly, ... Read More

Keep IT Assets Under Control & Kiss Your Spreadsheets Goodbye!

Keep IT Assets Under Control & Kiss Your Spreadsheets Goodbye!

You know you need to care about information technology (IT) security. And you really do. It’s high up there on your list of concerns, just after meeting payroll, acquiring new customers, serving the customers you have, and setting up your ... Read More

Coming Soon to an SMB Near You: Halloween IT

Coming Soon to an SMB Near You: Halloween IT

The stuff of an SMB manager’s nightmares are probably the usual suspects: financial projections, managing staff, and achieving growth targets. These are the standard subjects in business school, or the things you learn in the school of hard ... Read More

It’s Not About Big Brother, It’s About Good Security

It’s Not About Big Brother, It’s About Good Security

Keep your systems safe and your employee morale high with thoughtful IT policies Big Brother is indeed watching you. On this, the 70th anniversary year of the publication of George Orwell’s 1984, it’s been ingrained in our culture that this is ... Read More

You’ve Been Hacked: The Office Space Case Study

You’ve Been Hacked: The Office Space Case Study

What to really expect when your systems are compromised Hollywood has us convinced that cyber hacking is always accompanied by moments of intense drama, extended suspense and, just for good measure, a car chase or two. Reality is much closer ... Read More

How to Create a Social Media Policy to Protect Your Business

How to Create a Social Media Policy to Protect Your Business

All the World’s a Stage …. For social media hacking As the bard said, “all the world’s a stage …” But under the bright lights of today’s social media platforms, men and women aren’t merely players—they have starring roles in a global town ... Read More

Financial Firm Prevents Malware with Interfocus and CylancePROTECT

Financial Firm Prevents Malware with Interfocus and CylancePROTECT

Financial services firms are constantly under attack. Some estimates say that more than a million new malware threats are being created every day. Consequently, most companies invest in strong threat detection capabilities. But detecting the ... Read More

Plan Your FY2020 IT and Security Budget Wisely

Plan Your FY2020 IT and Security Budget Wisely

Listen to Mom: Budget on a full stomach As your FY2020 IT and Security budgeting process looms, you would be well served to keep in mind one of those old adages your mom may have passed along—namely, don’t go grocery shopping on an empty ... Read More

What’s the Password for the House of Gryffindor?

What’s the Password for the House of Gryffindor?

This week we’re jumping around a little and diving into Step 5 of the Small Business Administration’s guidelines for defending your business against cyber threats—Use strong passwords and change them often to protect from external and insider ... Read More