Get Started Today!  732-747-9373   

Fotolia 68929807 M new

DeckerWright Corporation Blog

DeckerWright Corporation has been serving the Red Bank area since 1984, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Mobile device management

DeckerWright Corporation is delighted to announce the introduction of its latest service offering for the management of mobile devices.  Now as a business owner, you can get control of mobile devices that access your company’s data but have been beyond the reach of your corporate policies.  Do your employees use an iPhone, iPad or Droid based device to access the company’s data?  DeckerWright Corporation’s mobile device manager will allow for remotely wiping the device, changing passwords and will log device locations throughout the business day.

Tags:
0 Comments
Continue reading

Step 1: BYOD Policy

Long before a company allows business documents to be accessed on devices owned by employees (Bring Your Own Device, BYOD), a strong and clear corporate acceptable use policy needs to be developed.  The policy should include how the employee’s device may be used on business time and what applications are acceptable.  The employee must agree to whatever software the company uses to distribute, secure and manage corporate documents.   The policy must include an acknowledgement from the employee that the company has the right to wipe the data from the device and that the company cannot be held liable for the possible destruction of any of the employee’s data.
Recent comment in this post
Taylahfry
In every organization there is a requirement of a policy. The policy main purpose is to enhance the company activity and the safe ... Read More
Wednesday, 07 December 2016 11:12
1 Comment
Continue reading

Mobile Security in three parts

The wide-spread use of SmartPhones, Tablets and Laptops have put a company’s data out into the “wild” like never before.  Securing corporate data, some of which may be protected by regulations like HIPAA and PCI, constitutes a major problem for businesses.  The three basic parts of protecting this important corporate asset includes device level security, data protection and employee agreements.  I will be conducting a seminar on the topic on March 19, 2013 that is hosted by the Monmouth Ocean Development Council (MODC).  Click on this link to register for the event. 
0 Comments
Continue reading

Is your business ready for BYOD?

A trend in technology has been for employers to allow employees to use their own devices to access corporate data.  The trend is referred to as “BYOD”, for Bring Your Own Device.  Employers have been quick to allow the access to employees without fully understanding the security and business implications.  If the company’s customer list winds up on the device of a person who just left the company, whose data is it and how can the company be sure it has been eliminated?  Employee handbooks and confidentiality agreements can establish data ownership, but how can you be sure the data has been cleaned off?  There are technologies available to both safeguard the data in the wild, and to erase the data if the device is lost, stolen or belongs to a former employee.
0 Comments
Continue reading

Facebook for normal people - How to upload pictures

Technology is finally becoming useful.  Combine a Smartphone and Facebook, and you can instantly post pictures for millions to see!  Click here to read about how your phone can talk to Facebook.
Recent comment in this post
Bellamaxwell
This is one of the most entertaining topic because there is not anybody who don't like to know about his favorite Facebook. I love... Read More
Friday, 23 December 2016 03:07
1 Comment
Continue reading

Office 365 Planning Guide

Office 365 is Microsoft's "cloud" e-mail offering.  Tight Outlook integration, shared contacts and calendars and ActivSync make Microsoft's "cloud" offering a great value.  Click here to read for insights into planning for an Office 365 e-mail migration.
0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Latest Blog

The advent of Covid-19, a Coronavirus, is accelerating a trend we have been seeing with our clients for many years. Employers are seeking out the best person for the job regardless of where they may be located. Many of our clients have employees scattered around the country,...

Account Login