JETT News
Multi-Factor Authentication: The Security “Option” that Isn’t Optional
With 61% of data breaches involving lost or stolen credentials such as passwords, the evidence is overwhelming that simple password authentication is inadequate for any …
Why It Is Important to Protect Your Company’s Intellectual Property
Are You Doing Everything You Should to Protect Your Company’s Intellectual Property? Data Loss Prevention (DLP) is an information security tool that can detect and …
Have you Assessed a Potential Insider Threat to Your Business?
It’s nothing new. Confidential information, sensitive financial records, critical customer data, and intellectual property are core assets for any successful business. Protection of these assets …
The 2020 Bulldog 100 Includes JETT Business Technology
For the second year in a row, JETT Business Technology has been named to the Bulldog 100. This year JETT was named to the distinguished …
Access and Data of Your Remote Workers – Is It Secure?
Providing safe and effective protection for remote workers is not a new topic. But today, more than ever, this is a key priority of all …
JETT Strengthening Low Voltage Cabling and Premise Security Services
JETT Business Technology is pleased to announce the establishment of our in-house Low Voltage Cabling and Premise Security Division. Although JETT has historically provided low …
An Explanation of What ‘The Cloud’ Really Is (Without the Geek-Speak)
Almost every day, someone on the JETT BT Team is engaged by a customer or potential customer with the following line of questioning: What Is …
Adding Protection and Safety in Our Information Technology World
An average of 5,000 to 7,000 new computer security threats are announced each year. That equates to as many as 19 new threats each and …
What Is the Weakest Link in Your Data Security?
It’s no secret that the answer to the question above is not “what” the weakest link is, but “who”. The weakest links for securing company …