Home Safe Home: Quick tips to keep your data secure during the COVID-19 outbreak.

With many businesses adopting, or at least temporarily accepting a work-from-home model as a response to COVID-19, cybersecurity experts around the world are raising the alarm on the increased threat of data breaches.  Here are 7 tips to help your company keep data secure while being corporately responsible. Employees: Who has access, who should not,…

Data Security and the Distributed Workforce

With many businesses adopting, or at least temporarily accepting a work-from-home model as a response to recent global events, cybersecurity experts around the world are raising the alarm on the increased threat of data breaches.  On March 06, 2020, the United States Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency provided guidance on how…

Connecting to Customers through Feedback

We here at WinMagic take customer feedback seriously.  From Product Development and Management, to Sales and Marketing, to Billing and Support, we’re always striving to do what’s right for our customers.  On our Support team, we’ve recently revamped our customer experience process to better address the feedback that we receive from our customers. In 2019,…

Working Hand-in-Hand with Microsoft Provides Customers Confidence in SecureDoc Windows 10 Compatibility

Customer confidence in your solution is critical to success.  That’s why WinMagic works diligently to ensure that our solutions support the environments that our customers use.  And for most of them, that’s Microsoft Windows. For years, WinMagic has participated in Microsoft’s various vendor programs.  We’ve been a Microsoft Partner, working alongside Microsoft to provide integrated,…

The Key to Protecting Data, Featuring Gartner

If there is one absolute truth in business, it’s that data is now everywhere. Big or small, companies wrestle with keeping data secure with an ever expanding mobile and agile workforce. Increasingly companies are turning to endpoint encryption as the answer to protecting their data. (more…)

The 6 Point Data Security Spring Cleaning Checklist

As an enterprise, you should not need an occasion to ensure that your security practices are up-to-date, fine-tuned and resilient. However, when immersed in the day-to-day it’s easy to overlook or neglect some of the standard best practices to securing your environment. The first signs of spring seem to trigger an inherent need to clean,…

Overcoming Weak Password Compliance

Have you taken the #LayerUP pledge? It’s an ingenious way to get people’s attention on a topic that might be considered frivolous, but which could result in some rather costly consequences if not followed – and that topic is Password Compliance.  In enterprises, getting all of the employees to adopt password best practices on a…

5 Qs Security Professionals Should ask for Cloud Migration

Have you heard of the great migration of Modern IT to the Cloud? It’s not new, revolutionary or innovative, and many enterprises are doing it.  But what we are seeing is, regardless of industry, migrating to a cloud solution is occurring for a myriad of different reasons – from strategic reasons, to the flexibility, productivity…