Tag Archives: Business

Cybersecurity matters

It’s unusual now to watch a newscast or read a paper and not come across a report or story of some computer security breach, theft or data or malicious program that’s wreaked havoc with a company’s, or the government’s, systems. On September 20th, the New York Times reported that Apple too is the target of malicious software in its App Store.

Tomorrow marks the start of National Cyber Security Awareness Month in the U.S. and the European Cyber Security Month. While there’s no way to insure that your business computers, devices and networks are 100% free from attack, there are a number of simple steps that businesses – even those without dedicated IT resources – can and should take to protect their business, customers and employees.

Perhaps the most important first step is to recognize that every business – even small and medium businesses – are potential targets. Hackers and distributors of malware are simply looking for any opportunity to steal information, accounts, passwords and identities. The less security they encounter, the easier their task. According to Chairman Steve Chabot (R-OH) of the Congressional Small Business Committee, “…71 percent of cyber-attacks occur at businesses with fewer than 100 employees.”

So how best can a business protect itself, particularly when it has no dedicated IT department or specific technical expertise? By deciding to implement a few easy precautions, to at least make it more difficult for hackers and others. And while our focus is business, these same suggestions work at home too and can help protect families.

  • Awareness and training – Employees should be made aware that there could be attacks and trained to recognize some of the signs of an attack or harmful email or phishing scam. Make sure that processes are in place to address requests for credit card numbers, payment information or personal data and that employees know what to do if those requests are received.
  • Password protection – Passwords are the keys to the kingdom and too often, good password policies aren’t in place or aren’t followed. Passwords should be unique, complex not obvious, and should be changed regularly. There are tools that can help manage passwords to reduce the burden.
  • Backup your data – It’s not difficult and it’s not expensive. A little discipline across all your systems will help a business recover from an attack or a catastrophic event.
  • Implement malware, spyware and firewall software solutions – This is like locking the door of a business at night. So many potential attacks can be stopped before they ever have an opportunity to steal or damage a business. Firewall, antivirus and malware software watches for possible attacks and threats and is exceptionally easy to install and manage.

Though cybersecurity month starts tomorrow, today marks the introduction of the 2016 update of the AVG Business AntiVirus and Internet Security software suite. Faster and less intrusive than ever before, these programs are that starting point for good business security.

Now is the right time to evaluate or review businesses security policies and to implement protection practices and tools if they aren’t already in place. It’s not hard to get started. The 2016 AntiVirus or Internet Security Business Editions are available at http://www.avg.com/business-security. In addition, AVG Business Partners have access to a range of resources to help establish better security and protection for clients.

Good business security doesn’t have to be overwhelming or intimidating, with the right software and by following some simple steps, all businesses can enjoy a little peace of mind.

 

Managed Workplace 9.2 makes big debut

As we shared last week, Managed Workplace 9.2 is now globally available to our channel partners and offers our slickest remote management and monitoring (RMM) solution to date. Now with premium remote control integrated directly into our RMM platform at no extra cost, we’re making it easier than ever for our MSP partners to provide remote IT management services to their business customers.

The new platform is also catching press attention and our AVG execs have been busy sharing the highlights with tech and channel media reporters at ChannelBuzz, Channel Insider, ChanelLine, CRN UK, CRN U.S., Lanline.de, and MSP Mentor.

More interviews are scheduled across our markets over the next few weeks. The response has already been overwhelmingly positive, with press coverage describing our updated platform as ‘game-changing’ and also touting the new premium remote control, backup disaster and recovery, and Mac support features.

As with Managed Workplace 9.1, the development process was driven in large part from the input of hundreds of our partners around the world. We want to ensure that our products meet their evolving needs and we are proud to say that our latest version of the platform does just that.

In developing 9.2 and integrating additional features, we continue to partner with the best in the industry. Partners such as ISL Online, a Slovenian company with more than 200,000 customers in more than 100 countries helped us integrate premium remote control seamlessly into our platform. Our Backup and Disaster Recovery partner Infrascale is also a proven leader, recently named a Gartner Cool Vendor as ‘innovative, impactful and intriguing.’

The value of strategic partnerships like these can clearly be seen in the reaction to the end product. Initial feedback from our channel partners has been fantastic. Many have said using the updated platform will be a ‘no brainer’ for them. Some of our partners have already previewed the updated platform, with Advanced Technology Services (USA) providing feedback that “it works great on both Macs and PCs, features a new user interface that instantly shows all activity, and also enables us to seamlessly view user sessions.”

We recognize that our channel partners need IT simplicity and efficiency. The updates we have made to Managed Workplace 9.2 show our ongoing commitment to putting partners first.

We are listening and appreciate your feedback.

From Beacons to Dash – a glimpse at the future of retail and IoT

According to a new research by Juniper Research, retailers will invest $2.5 billion on IoT within the next five years — four times the investment being made in 2015.

Some of the biggest retail IoT investments are being made in location-based beacon technology. Bluetooth-based beacon technology, like Estimote, transmits location information from beacons to smartphones and allows retailers, once you’ve opted in, to track your whereabouts and communicate real-time via their own app. The retailers can provide customers with personalizedm relevant ads and other useful information.

Forgot your shopping list? No worries, you’ll be reminded of products when you enter the store based on your previous purchases, or access shared shopping lists, and receive relevant special in-store coupons and deals.

Target is among the growing list of retailers testing the technology. It launched a test of beacons in 50 stores. One of the features integrated in Target’s app allows it to push timely recommendations and deals in proximity to a shopper’s location.

For a glimpse of how beacons are taking root at retail, Mobile Commerce Daily recently profiled a pilot program at Illinois-based Niemann Foods’ County Markets. The 44-store chain’s launch of in-store beacons provide shoppers with personalized digital offers, location-specific coupons and in-store maps to streamline the purchasing experience.

The results have been positive, including coupon redemption rates as high as 50 percent, compared to a printed ad coupon industry average of below 2 percent, reports Nathaniel Jones, the electronic marketing manager at Niemann’s.

According to the 2015 Store Operations Survey by Retail Touchpoints, nearly 46% of retailers either now have or plan to use beacons in their stores. For now, most of the beacon programs are being deployed in pilots on a small scale as retailers try to understand how the technology can foster customer engagement. So far, analysts report that the biggest barrier to adoption is getting consumers to turn on the Bluetooth capability on their phones.

Now, in new developments at the other end of the IoT retail spectrum away from the store and more conveniently located in your own home comes the new Amazon Dash Button. The eCommerce giant has begun offering the Wi-Fi-enabled Dash buttons for its Prime customers to install in their homes to make it possible to re-order online without even needing to login to Amazon. The inexpensive (US$4.99) small plastic Dash buttons are designed to be placed throughout the home to make it easy to re-order anything from coffee to soap — from where you use it most — with just a press of the button. No need to hassle with a shopping list, Dash is on the case!

On the downside, the Dash service is still in early stages and currently has limited product availability. However, it is earning the support of major brands from Maxwell House to Clorox. And, for the near-term, Dash does not provide immediate gratification; you still have to await a typical Amazon Prime shipment and delivery timeframe of overnight or later, depending on the product availability. (But that may change with Amazon’s planned deliveries by Drones sometime in the future!)

Also on the downside, think of the results if a button-pushing happy child or a teenager plays with Dash? What to do with twenty bags of dog food delivered at your door?

Looking even further ahead to where retail IoT is headed, Time Magazine asks in its review of Dash: “What happens when consumption becomes even less of a conscious process — when, say, our smart cupboards and refrigerators, empowered to monitor what we’re using, start making buying decisions autonomously?”

Indeed. There are definitely a few things to be worked out about the future of IoT and retail in our lives. Chief among them, we believe, are privacy and security safeguards. All the new retail and other IoT technologies and services hinge on data — your data. They are feeding customer data and behavior back to retailers and their vendors to be tracked, analyzed and recorded.

Both the beacon apps and Dash are opt-in services, and consumers must give their permission and have a choice to use them or not. But increasingly with IoT, consumers will face the question: Are you more concerned with privacy or convenience?

And the same question is of supreme importance to businesses in their adoption of IoT. Business owners, small or large, have to gauge these new IoT opportunities for the potential and risks involved…not to mention the potential for annoying customers.

The IoT may prove to be the biggest game-changer since the Internet itself, with wide-ranging implications to society. And like the Internet before it, all of those implications and protocols that will be needed, aren’t yet known. It’s a brave new world and we all need to get ready for it.

At AVG, our prime concern is with privacy and data security, and that’s why we are involved at the industry level to protect them.  For example, we support the OTA IoT Trust Guidelines Framework, which was issued this past month. To read the full Framework Goals you can visit the OTA site.

AVG kicks off free on demand training series for partners

Opportunities for business growth are often right in front of us but taking advantage of them and succeeding may require specific knowledge or experience. This is why we have established the AVG Business Accelerator Partner Academy to help support your growth and equip you to win in your markets.

Through the Academy, we offer you and your team free online technical training in six modules as well as business transformation training in three different modules. We’ve worked with industry leaders and MSPs to design the curriculum specifically to help AVG Business partners grow and succeed rolling out Managed Workplace to your customers.

We know your time is limited and very valuable. The tracks we’ve put together are based on what you have told us you need, designed to help give you a competitive advantage. We want to equip you for success in your market and help in any way we can to accelerate your growth.

Beginning this month, the Business Transformation training kicks off and includes:

  • September:  Sales & Marketing Transformation
  • October: Business Transformation
  • November & December: Service Transformation

The technical training, which will include six modules split into several short videos covering Installation through to Reporting, will be available in October.

These ‘live’ sessions will include open Q&A sessions so that you can learn from our specialists and other MSPs in real-time. After each scheduled training session, these will be available for viewing on demand via our Partner Portal (sessions available for viewing October 1 and after).

Taking the Academy curriculum will help you:

  • Build your leads inflow and pipeline for business.
  • Leverage professional services automation to increase efficiency and profitability.
  • Work in partnership with your account manager to seize new revenue opportunities.
  • Use metrics to better manage sales, marketing and operations.
  • Better represent your expertise with customers and potential clients.

I encourage you to attend and let us know what you think. We’re listening.

To find more information and sign up for free training, visit AVG Business Accelerator Partner Academy.

 

AVG Business responds to evolving channel needs with enhanced Managed Workplace platform

Since we launched our flagship AVG Business Managed Workplace 9.1 in April 2015, the ongoing dialogue and feedback from our channel partners has been crucial. Managed Workplace 9.2 – the latest version of the platform, available today, addresses the needs our partners have raised. We are confident that the additional capabilities we have included in the expanded platform align to MSPs’ business objectives more closely than ever before.

An important feature in Managed Workplace 9.2 is the Premium Remote Control capability, through our partnership with enterprise remote desktop software provider, ISL Online, that has enabled us to integrate a premium Remote Control capability into our platform for the first time. By building in the remote control at no further cost to our partners, we are able to reduce not only the need for MSPs to work across disparate systems, but also the need to purchase additional, expensive, third-party tools. Offering greater control and visibility to resolve issues and deliver support more quickly, the Premium Remote Control enables MSPs to quickly and easily access remote computers, transfer files, chat, record sessions and perform administrative tasks for their clients, without switching interfaces.

Those of you who attended our Cloud Summit last October will remember discussing remote controls in detail – it’s a great example of you telling us what you wanted, and us listening and responding.

We want to help small enterprises and our MSP partners feel that they are doing everything they can to protect their data. At the same time, we recognize that monitoring so many different systems requires a streamlined workflow. Managed Workplace 9.2 now includes integrated Backup and Disaster Recovery, so that MSPs can easily control workstation backups, capture Bare-Metal-Recovery images for servers, as well as monitor and manage devices from one central dashboard.

Further details on the key features of the Managed Workplace 9.2 platform, including AVG Device Manager for Mac OS X and integrated AntiVirus enhancements can be found here.

With Managed Workplace 9.2, we move one step closer to a complete, managed IT solution – one which provides ease of use, security and control of the entire IT infrastructure (devices, applications and networks) from a “single-pane” of glass. We understand that our channel partners’ technology needs are always evolving and we are committed to doing all we can to streamline the experience while delivering the best services possible.

We are listening. Thank you for your ongoing feedback and please keep sending it our way.

The future of work-life balance and tech

Many of us question the impact of technology on work-life balance, as our lives play out in the always on, always connected 24×7 workplace.

Now, in the heat of the late summer, the topic has become a hot one in the tech industry itself – from a controversial new New York Times expose that examines Amazon’s purported workplace culture to the highly-reported news of increased parental leave programs by key companies and, finally, a release of some annual  “top” ranked company lists.

First, a look at the expanded parental leave offerings unveiled this summer:

  • Netflix announced it is offering a year’s paid maternity or paternity leave to its employees.  Specifically, Netflix has put in place “an unlimited leave policy for new moms and dads that allow them to take off as much time as they want during the first year after a child’s birth or adoption.”
  • Microsoft said it would offer 20 weeks of paid leave to new mothers, up from its current 12 weeks paid and eight weeks of unpaid leave. New fathers will get 12 paid weeks, instead of four paid and eight unpaid.
  • Adobe said it would offer parents who are the primary caregivers 16 weeks of paid leave after the birth or adoption of a child – in addition to 10 weeks of paid medical leave following childbirth. That means a new mother could take a total of 26 weeks off — up from the current nine weeks.

Among offerings of other tech giants already in place: Google raised its paid maternity leave from 12 to 18 weeks in 2007. Facebook’s new parents receive four months of paid leave, as well as $4,000 in “baby cash.”

Analysts say the underlying goal of the newly updated parental leave programs is not totally altruistic,but are efforts for the companies to stay competitive in the super competitive Silicon Valley tech job market. They also expect that outside of the tech sector, little will change… particularly for startups and smaller businesses that cannot afford to provide equally rich programs.

While the new parental-leave policies of tech powerhouses are innovative, the U.S. is still playing catch-up when it comes to other nations. For example, the U.S. is the only developed country that does not mandate any paid leave for new mothers. (See Pew research on the topic from 2013 here.)  BTW, in most countries that offer paid time for mothers (a median of 5-6 months), their government picks up the tab and paternity leave is more limited (offered by only 25 of the 38 nations).

U.S. Sen. Kirsten Gillibrand of New York and U.S. Congresswoman Rosa DeLauro of Connecticut are pushing for a new law that would provide 12 weeks, but not unlimited leave, in the U.S. under their bill, employees and employers would make small contributions and pool them so that workers can draw a significant portion of their pay while caring for a newborn or for other serious personal or family illness.

To be sure, advances that are taking place toward work/life balance in the U.S. aren’t only in the domain of Silicon Valley. In its examination of the 25 companies that have “the best” work/life balance in the U.S, Forbes Magazine cited more exemplary non-tech companies than tech examples.  Forbes’ criteria went beyond time-off to other considerations.

According to the Forbes list, the best company for work/life balance for the third year in a row, is non-tech giant Colgate/Palmolive. Among tech companies to rank on the list were Google, Nokia, Philips, Motorola, and Intel… You can access the list here. (The Forbes survey, conducted in concert with the job search engine Indeed, ranked companies with least 100 employees which hire primarily full-time workers. The list does not include government or military organizations, colleges and universities, nonprofits, or staffing agencies.)

The Forbes survey also notes that in 2015 work/life balance, flexibility is fast rising up the ranks in importance. Though the number one consideration for people is still pay, number two is location and number three is flexibility – even ahead of benefits.

In the end, though it may be a culprit when it comes to taking away from our work/life balance, technology is also a driving factor in helping make the balance possible…

And there lies a conundrum that we in the tech industry and all companies must all continue to work on.

A London NHS clinic leaks 780 patients’ details.

The 56 Dean Street clinic in London accidentally released the names and email addresses of 780 patients who have attended HIV clinics.

In a statement released on their website, a spokesperson for Chelsea and Westminster Hospital NHS Foundation Trust stated:

“We can confirm that due to an administrative error, a newsletter about services at 56 Dean Street was sent to an email group rather than individual recipients.

“We have immediately contacted all the email recipients to inform them of the error and apologise. Any concerned patients can call  020 3315 9555 and 020 3315 9594.”

In an interview with BBC Dr. Alan McOwan has said that, “Not everybody on the list is HIV positive.”

This data breach comes on the heels of a similar incident that occurred earlier last month to UK based holiday company Thomson. The 56 Dean Street clinic data breach, while unfortunate, again underscores the importance of having appropriate data security policies and procedures in place, as well as the need for employee training on the handling and protection of sensitive data.

The cost of a data breach can affect more than your bottom line, it can affect lives too. So if you’re in doubt about the security of your own IT infrastructure, download AVG’s Small Business IT Security Guide or take the AVG Small Business IT Security Health Check now to find out what you can do to help prevent security and data breaches.

If you need comprehensive protection against online threats for your business PCs, network and email, take a look at AVG Internet Security Business Edition.

#ShredFest helping protect against Identity Theft

It’s no secret that personal data and private information left lying about, either in physical or digital form, can be used by thieves to steal your identity.  The problem is that securely destroying old documents, especially if you have boxes and boxes of them, can be time-consuming and frustrating.

And if you don’t destroy your data securely the consequences of being a victim to identity theft can range from outright theft of money, to unexplained debts, leaving you feeling like somebody else has taken over your life.

But thanks to a growing movement called #ShredFest originally from New York, things might get a little easier. It’s a subsidised program designed to provide secure document destruction free-of-charge. You might already have something similar in your local area, sometimes run by local banks and communities once or twice a year – or perhaps this is your opportunity to make-it-happen!

The statistics on Identity theft are nothing short of shocking. In the United States the Federal Trade Commission reports that in 2014 it received 332,646 complaints making ID theft the number one reported crime for the 15th year in a row. 

Stolen identities used in the United States in 2014 were used mostly for Government and benefits related fraud (30%) followed by Credit Card fraud (26%), Phone/Utilities fraud (16%) and Bank fraud (10%).

With the ability for criminals to collude easily on a global scale, it’s not inconceivable that we will see ID theft attempts in the future combine information obtained from the litany of online data breaches (for example, Ashley Madison), along with tidbits obtained through “dumpster diving” right at your own back door.

Fortunately, with a few simple precautions and some dedication to properly destroying the remnants of your online correspondence, and other important paperwork (that you’re no longer required to keep by law), you should be able to reduce the risk of ID theft happening to you.

Destroying Physical Documents

Got boxes of documents that you should be securely destroying? Despite #ShredFest only being available in a small number of locations at the moment, a quick search online reveals many companies that provide shredding services for a small fee.

But weighed up against the risk of ID theft against you at any time, it may well be worth it at any cost; and think of how a quick trip to your local shredding depot with a car-load of documents is not only going to put your mind at ease – but all that storage space you’ll get back at home!

Another alternative is to purchase your own document shredder – something that I have owned for many years and highly recommend – however, those boxes of tax paperwork may still be inescapable, so an annual trip to #ShredFest is likely still needed.

If you do purchase your own shredder, however, consider one that has a “cross-cut” feature (that cuts the paper into smaller pieces) which is considered a little more secure, and also there are models that can shred old CD-ROMS and DVDs which can come in handy.

Shredding Computer Files

Did you know that selecting a file and pressing delete, or simply moving the file to the trash (even after you empty it) isn’t enough to securely remove it?  It’s important to understand how to securely delete digital files on all your devices – not just your PCs, but also Mobile devices.

We’ve covered in the past how easy it is to use features like AVG’s File Shredder which can overwrite your private and personal files multiple times to ensure they cannot be recovered again.

Also if you’re recycling your old PC’s or Mobile devices, including disposing of them permanently, ensure you have taken all reasonable steps to correctly erase the data on them – this sometimes isn’t as easy as a simple factory-reset, particularly with older Android mobile devices.

Lastly, if you have an online email account (such as Gmail, Yahoo or Outlook.com) you’re likely holding on to years worth of old email that could prove to be extremely valuable to an ID thief.  As I suggest in these tips about securing your online email account, make sure you purge all your old and unwanted email too.

Until next time, stay safe out there.

Unicorns: Perhaps Not As Rare As We Thought

So what’s a Unicorn? Here’s the study’s definition: “Many entrepreneurs, and the venture investors who back them, seek to build big, impactful companies valued at a billion dollars or more. We called these companies ‘unicorns’ because what they had achieved seemed very difficult, rare, and relatively unstudied.”

The latest study, the second by the venerable tech startup news site, has some surprises, as well as corroborates what has become conventional wisdom in Silicon Valley.

There’s a lot of data to chew on in the study and you can read the full post here. But parsing through it, there is a lot to learn, whether you’re a start-up, an investor, or just curious about markets.

Here are some of the interesting takeaways that I gleaned.

First, the surprising:

 

Unicorns are not as rare as we thought

The latest study revels that there are more Unicorns than one might think. There were 84 companies profiled in this year’s study—more than a 100% increase from last year. Granted, a lot of the companies were “paper” Unicorns (companies valued on paper that have not had liquidity events.) But the total value of the companies was $327 Billion and 2.4x the last analysis (“excluding Facebook, which was almost half the value of our last list.”)

 

Old is the “New” New

As the study maintains, for every wunderkind out there, a seasoned leader or founder (and, perhaps more importantly, a co-founder) may be your best shot at becoming, or finding, a Unicorn.

The study found that companies with educated, tech-experienced, older co-founding teams with a history together have built the most successes in this rarified club. And the co-founding aspect was interesting as well. As the study noted, 86% of the companies had co-founders, or a “super-majority” according to its lingo.

While some of this may be counter-intuitive to the traditional Silicon Valley narrative, it makes sense to me on several levels. An experienced leader can gauge a market, and having a co-founder gives you a chance to bounce ideas off one another, whether it’s reigning in your partner or just having “green-light” time. (I’ve had co-founders in all three of my entrepreneurial ventures.)

 

In the not so surprising camp:

 

IoT is gaining impact

This year, the Unicorn study recognized the Consumer Electronics/Internet of Things as its own category. According to the study, five companies, which make up 6% of the list, have raised a combined $266 million on average and are valued at 18x the private capital raised. While it is the smallest of the categories (after E-Commerce, SaaS, Enterprise and “Audience” or ad-driven businesses– ranked by order of value from first to last), to me, this is just another sign that the Internet of Things is ripe for takeoff.

 

Diversity: Still too Little

This last survey statistic from the study that I’ll share is in diversity, where the numbers fall into the not-so-surprising camp.

While the study determined that 50% of founders or co-founders of Unicorns came from outside the U.S. (from India to Canada) it shows diversity among Unicorns diversity is trending up, but is still low. TechCrunch reports this year the list welcomed two companies with female leaders, compared to no female CEOs on its last list. As well 10% of the co-founders on this year’s list were female, double last year’s survey. Like its average startups counterparts in the valley, 70% of the companies surveyed had no gender diversity at the board level… Please note: the study was unable to track racial or ethnic diversity.

So in terms of diversity, this “rarest of the rare” breed of venture backed tech companies are doing about the same as run of the mill startups and tech companies in Silicon Valley.

Ultimately, when I look at this study, however, I am an encouraged to see that attributes like experience, collaboration, and inclusion, as well as innovation, are being called out as measures of success. These are all values worthy of attention, whether you aspire to be a Unicorn or not.

 

Title image courtesy of TechCrunch

UK Government is addressing SMB cyber security needs, but are you doing enough?

The scheme will offer micro, small and medium sized businesses up to £5,000 for specialist advice to boost their cyber security and protect new business ideas and intellectual property.

The initiative will also enable firms to access services from the UK cyber security industry, and help them to adopt Cyber Essentials, a government-backed, industry supported scheme to help organisations protect themselves against common cyber-attacks.

With small businesses still guilty of underestimating how valuable their data is to the global, cybercriminal network, I fully support the initiative and would advise any small business to take advantage of the offer. In the UK, many small businesses are still not investing significantly in cyber security measures – recent government figures suggest SMEs with 100 or more employees spend about £10,000 per year, while the smallest firms spend as little as £200.

It’s clear that more guidance is needed, and with so many resources now available there is no reason not to be better informed. I wonder if this news has prompted you to consider your own cyber security needs and if so, how many of you plan to sign up?

It would be great to see similar schemes rolled out beyond the UK, and I fully expect this will happen as security continues to rise further up the news agenda. For those not eligible for schemes such as this, I would advise you to adhere to the following best practices:

  • Educate your staff via in-person training sessions and by providing regularly updated resources on the threats landscape
  • Always make sure your customer data is stored in an encrypted database
  • Require multiple levels of passwords to access any database storing customer information; and change these passwords frequently
  • Regularly run background checks on employees handling customer data
  • Make sure to have malware detection software running on both your servers (hosted or not) and workstations and that it, and your operating systems, are regularly patched and updated
  • Review and implement the standard network security health check controls
  • Make sure your Crisis Management or Disaster Plan (which you should also have) includes a data breach plan

With the volume and scope of small business security threats on the rise, SMEs simply cannot afford to wait and risk becoming the next breach we read about in the morning papers. It’s great to see that government is taking further steps to address the cyber security issues SMBs face, but it’s an issue we all need to address – both as businesses and employees.

For more information on keeping your business safe, visit the AVG Business website.