Network Security Articles

Network Security

Want to learn more about Business Network Security?

The Walker Group provides employee computer and network security consulting.  
Below you'll find our thoughts on on the subject.
By Jeff Williams 11 Mar, 2021
Discover the significance of ADA compliance for your website. Ensure inclusivity and accessibility for all users with expert insights and guidance.
By Jeff Williams 03 Mar, 2021
Understand the impact of GDPR on your business. Explore its implications and ensure compliance with The Walker Group. Learn more today.
By Todd Bailey 05 Aug, 2020
Discover secure remote working solutions at The Walker Group. Ensure your team can work efficiently and safely from anywhere. Explore now.
By Brendan Kelly 20 Mar, 2020
Be on the lookout for spoofing emails and messages from accounts who purport to be an official agency such as local, state or federal government, or agencies such as the IRS, Medicare or VA.
By Brendan Kelly 20 Mar, 2020
Depending on the level of planning and remote workforce policies of your company, you may or may not be set up with satisfactory levels of security at your home office.
By Diana Sutcliffe 04 Nov, 2019
"I Facetime with my sister and two-year-old niece all the time. It’s one of my favorite uses of technology, but when I answered their call on a recent Tuesday night, I was greeted by three strange men waiving at me from an internet cafe. It was a real shock. I hung up, they called again. Each time, my sister’s photo came up on the screen which made it upsetting. I wondered, in an old-fashioned way – are the lines crossed? Could phone lines even be crossed in the age of cellular technology?! Then, I started to get texts and threats from her phone number. I couldn’t believe my sister or I had been hacked. I emailed my sister to not make contact with me over the phone for the time being. We both tested some things and turns out it was me they were after. A bit rattled, I began to dig in. "
By Todd Bailey 13 Sep, 2018
My business is too small to be hacked, right? Wrong! It seems that, once a month, there is a report about XYZ Company announcing that they had a security breach. The worst part, it happened 3+ months ago and they just figured it out. As a small business owner, you may be saying, “This can’t happen to me! I am too small to be hacked!“ You may think that hackers are after larger companies with deeper pockets. As a managed service provider, The Walker Group hears this all too often and usually after the attack has already happened. Now, the business owner is left with lots of difficult and expensive choices to make.
By Brendan Kelly 05 Jul, 2018
Many small businesses issue tablets to employees working in the field. It’s important for businesses to have a centralized mobile device management (MDM) tool capable of locking certain apps and restricting features that can potentially place the devices at risk. Additionally, companies can wipe any data remotely with their MDM tool if the device is stolen.
By Brendan Kelly 20 Oct, 2017
October is Cybersecurity Awareness Month. Stay informed and protected with our guide. Develop your plan and safeguard your business today.
Show More
Share by: