Interfocus Blog

Combating Carelessness Where Man & Machine Intersect

Combating Carelessness Where Man & Machine Intersect

No software developer sets out to write bad code, and no systems administrator wants to do shoddy work, but in today’s “move fast and ... Read more >

It’s All in the Numbers: Protecting Small Business Against Cyber Crime

It’s All in the Numbers: Protecting Small Business Against Cyber Crime

60 and 6. Simply put: 60% of small businesses that suffer a data breach go out of business in 6 months or less. These are scary ... Read more >

Don’t Caulk Your USB Ports

Don’t Caulk Your USB Ports

It was difficult to imagine how disruptive a piece of technology it would become when the venerable thumb drive — Inexpensive, portable Read more >

Dear Employee: It’s Not About You

Dear Employee: It’s Not About You

It’s not about you. We think you’re great—and we want a lasting relationship. But this employee monitoring stuff is there for all of ... Read more >

Just Say No to Cybersecurity Training

Just Say No to Cybersecurity Training

Yearly cybersecurity training. Everyone has to do it, no one enjoys it. But the number of threats to your business is growing fast. Read more >

Who Is the Insider Threat? (Answer: It’s You!)

Who Is the Insider Threat? (Answer: It’s You!)

What would you do if the biggest threat to your company’s cybersecurity is also your very best employee? Or your CEO? Or his kids? Read more >

The Small Business Cybersecurity Burrito Nightmare

The Small Business Cybersecurity Burrito Nightmare

Small business is where it’s at in the USA. With more than 28 million already operating, and half a million more starting up every ... Read more >

Artificial Intelligence Makes Your IT Department Smarter

Artificial Intelligence Makes Your IT Department Smarter

The potential for Artificial Intelligence to change society has been widely discussed in both technical and non-technical communities. ... Read more >

Eight Common Mistakes in IT Asset Management and How to Avoid Them

Eight Common Mistakes in IT Asset Management and How to Avoid Them

As an IT professional, like anyone else, mistakes are inevitable. Unfortunately, with your business’s growing reliance on digital data ... Read more >

Understanding Insider Threats: A real, but often ignored, source of cyber risk

Understanding Insider Threats: A real, but often ignored, source of cyber risk

You may think that the notion of insider threats is something from a movie or a conspiracy theory site. However, the reality is that ... Read more >

Employee Internet Monitoring — Big Brother or Big Benefits?

Employee Internet Monitoring — Big Brother or Big Benefits?

That undeniable feeling that you’re being watched can be unsettling. Sensing that your every move is being monitored may cause you to ... Read more >

Monitoring Healthcare Endpoints and Users Is Your Best Remedy for Your Security Program

Monitoring Healthcare Endpoints and Users Is Your Best Remedy for Your Security Program

In the recent US midterm elections, healthcare was a key factor for voters. Americans are clearly worried about healthcare coverage and Read more >

Schedule a Demo