BYOD is more than e-mail access

BYOD is more than e-mail access

A data-centric approach can enable a “Bring Your Own Device” policy. While companies may supply senior staff with a smart phone, more and more employees want to tap into work on their personal devices.

read more
Ransomware Basics: A Checklist

Ransomware Basics: A Checklist

Most malware can be stopped by simply getting back to basics. We’ve put together a checklist that you can do today to help protect you right away.

read more
Ransomware: Hey There, Delilah

Ransomware: Hey There, Delilah

Blackmail, extortion and secrets are surfacing in the tech world and it’s not your ex leaking your dirty laundry. A malware Trojan named “Delilah” is the culprit behind these threats.

read more
Cluttered Desk, Logical Mind?

Cluttered Desk, Logical Mind?

Right-brained creatives have long argued that messy desks are a necessity to creative thought. But is it actually the sign of an optimized, clean mind?

read more
A $750,000 laptop

A $750,000 laptop

How a less-than-25 employee company was fined $750,000 for an employee leaving a laptop in his car.

read more

Data Centricity

A blog by the Practical IT Innovators at ASMGi.

Data Centricity

ASMGi discovered long ago that the importance of data transcends trends, hype or new approaches. That holds true in security, software development, IT Services, Sales and Marketing Solutions and certainly in the Cloud. Our blog may touch each of our practice areas, but in the end, it's always about the data.