The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

Methods to prevent breaches on employees’ devices

Methods to prevent breaches on employees’ devices

November, 2019 | Foster Charles

While data breaches are known to be caused by cybercriminals who deliberately attempt to break into a system, we actually have human error to thank. In fact, employee negligence brought about by [...]

Top 5 ways to keep in touch with your remote workforce

Top 5 ways to keep in touch with your remote workforce

November, 2019 | Foster Charles

The modern workplace isn’t just employees stuck behind their desks anymore. Increasingly, businesses hire workers who telecommute from cities beyond company headquarters.

Virtual desktop infrastructure (VDI) vs. Desktop-as-a-Service (DaaS): Which is right for your business?

Virtual desktop infrastructure (VDI) vs. Desktop-as-a-Service (DaaS): Which is right for your business?

November, 2019 | Foster Charles

Desktop virtualization is becoming an important technology because more and more employees demand to be cut loose from their cubicles. The term might sound like the sci-fi theme of your next holiday [...]

How cybersecurity assessments save your business money

How cybersecurity assessments save your business money

November, 2019 | Foster Charles

In most organizations, cybersecurity is perceived as a concern of the IT department alone. Unfortunately, small businesses rarely have a dedicated security team. Instead, businesses often set and [...]

The worst data breaches in history

The worst data breaches in history

October, 2019 | Foster Charles

Though many businesses have reached a point of desensitization when it comes to news about data breaches, stricter implementation of data regulations highlights the importance of protecting user [...]

Hartford businesses need layers of cybersecurity solutions to stay safe

Hartford businesses need layers of cybersecurity solutions to stay safe

October, 2019 | Foster Charles

The media is always quick to highlight devastating data breaches when they hit big companies, but smaller organizations aren’t spared and are often considered the best targets. Sadly, small [...]

9 tips to prevent employee-induced security breaches.

9 tips to prevent employee-induced security breaches.

October, 2019 | Foster Charles

Your business can invest all the funds on the latest cybersecurity technology like firewalls and threat detection tools, but there will always be one security risk that can't be blocked from entering [...]

Best practices in password management

Best practices in password management

October, 2019 | Foster Charles

Passwords will always be relevant. Think of them as virtual keys to your home online. Hackers have tens of thousands of generic or popular keys on hand for launching brute force attacks, so using [...]

BYOD and compliance: What you need to know

BYOD and compliance: What you need to know

September, 2019 | Foster Charles

The bring your own device (BYOD) phenomenon continues to rise in the workplace. As discussed in our previous articles, there are a number of benefits and risks that BYOD brings. For it to be [...]

How to have a successful remote work policy

How to have a successful remote work policy

September, 2019 | Foster Charles

Over the past few years, remote work has gone from being just a trend to a more prevalent policy across organizations, big and small. Advanced technology and mobile solutions have not only enabled [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”