Cyber Security

/Tag: Cyber Security

RadiusPoint Expands ExpenseLogic 8.0 Capabilities

By |2019-09-03T15:24:28-04:00May 17th, 2019|Categories: Press Release|Tags: , , , , , , |

FOR IMMEDIATE RELEASE Orlando, FL May 17th, 2019- RadiusPoint, the leading service provider for telecom and utility expense management, has announced they will be expanding the Site Manager section to allow for Site and Equipment inventory to be managed within ExpenseLogic 8.0 software.  Last month, new additions were announced for Q2 updates and this is an extension of [...]

How Secure Is Your Data?

By |2019-07-31T16:18:29-04:00May 2nd, 2019|Categories: News|Tags: , , , , |

Today is World Password Day, a day to promote and raise awareness for better password habits. Passwords are critical gatekeepers to our digital identities, allowing us to access online shopping, banking, social media, private work, and life communications. Without robust security protocols firmly in place, you are at risk for several cyber-attacks. Security and data have [...]

Managing Mobility in a Wireless World

By |2019-08-13T12:55:05-04:00November 7th, 2018|Categories: EEM, News, WEM Managed Services|Tags: , , , , , , , , |

Most organizations live in a world of mobility. As enterprises are adopting sophisticated smartphones and increasing their mobility spends, managing security, service costs, and procurement has become critical. Whether it is through a mobile sales force, work anywhere employees, technicians or remote offices; IT departments are accountable for tracking employees and devices at overwhelming levels. This begs [...]

Do you have Cyber Security Protocols in Place?

By |2018-10-12T09:46:51-04:00October 12th, 2018|Categories: News|Tags: , , , , , , , , , , |

October is Cyber Security Awareness Month and at RadiusPoint©, we want to provide you with some helpful tips to protect yourself and your company. Identify and Report Phishing is one of the most common technique scammers and hackers use to illegally gain access to private company information. What occurs many times is a phishing attack presents [...]