HELP DESK Support – (678) 387-5715

  IT Services – (678) 387-5717

JETT News

Multi-Factor Authentication

Multi-Factor Authentication: The Security “Option” that Isn’t Optional

With 61% of data breaches involving lost or stolen credentials such as passwords, the evidence is overwhelming that simple password authentication is inadequate for any …

Read More →
Protect Your Data

Why It Is Important to Protect Your Company’s Intellectual Property

Are You Doing Everything You Should to Protect Your Company’s Intellectual Property? Data Loss Prevention (DLP) is an information security tool that can detect and …

Read More →
Insider Threat

Have you Assessed a Potential Insider Threat to Your Business?

It’s nothing new.  Confidential information, sensitive financial records, critical customer data, and intellectual property are core assets for any successful business.   Protection of these assets …

Read More →

The 2020 Bulldog 100 Includes JETT Business Technology

For the second year in a row, JETT Business Technology has been named to the Bulldog 100.  This year JETT was named to the distinguished …

Read More →

Access and Data of Your Remote Workers – Is It Secure?

Providing safe and effective protection for remote workers is not a new topic. But today, more than ever, this is a key priority of all …

Read More →

JETT Strengthening Low Voltage Cabling and Premise Security Services

JETT Business Technology is pleased to announce the establishment of our in-house Low Voltage Cabling and Premise Security Division. Although JETT has historically provided low …

Read More →

An Explanation of What ‘The Cloud’ Really Is (Without the Geek-Speak)

Almost every day, someone on the JETT BT Team is engaged by a customer or potential customer with the following line of questioning: What Is …

Read More →

Adding Protection and Safety in Our Information Technology World

An average of 5,000 to 7,000 new computer security threats are announced each year. That equates to as many as 19 new threats each and …

Read More →

What Is the Weakest Link in Your Data Security?

It’s no secret that the answer to the question above is not “what” the weakest link is, but “who”. The weakest links for securing company …

Read More →
Scroll to Top