Out of the Box Solutions Blog

Out of the Box Solutions has been serving the Michigan area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

What to Do Before Your Phone is Stolen, and After

Anyone that has lost their smartphone knows it is a rather traumatic experience. Not only is your entire life on the phone, likely so is your work. With smartphones becoming a major part of doing business, and their use for business purposes, a lost device can cause major headaches. Today, we will go over some strategies you can implement to mitigate the damage if/when you or one of your employees loses a device with sensitive company information on it.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Productivity User Tips Privacy Communication Malware Data Efficiency Tech Term Internet Microsoft Google Mobile Device Smartphones Hardware IT Support Hackers Innovation Windows 10 Android Email Cybersecurity Ransomware Cloud Communications Users Mobile Devices Business Managed IT Services Business Management Passwords Network Small Business Browser IT Services Applications Outsourced IT Collaboration Software Information Workplace Tips Data recovery Internet of Things Wi-Fi Backup Saving Money Wireless Social Media Holiday Apps Bandwidth Smartphone Data Backup Managed IT services Employer-Employee Relationship VoIp Marketing Blockchain Gadgets Managed Service Networking Value Computer Hosted Solutions Cloud Computing Microsoft Office Gmail Business Intelligence VPN Chrome Data Management Healthcare Mobility Computers Managed IT Service Tech Terms Data Security Connectivity Save Money Patch Management Compliance Remote Computing Net Neutrality Company Culture Automation Facebook Office Paperless Office Cost Management Artificial Intelligence Remote Monitoring and Management Office 365 Voice over Internet Protocol Virtual Assistant Password Analytics Cortana Wireless Charging Miscellaneous Access Control Telephony Upgrade Virtualization Medical IT BDR G Suite Certification Customer Service Safety Threat Spyware Authentication Data Protection RAM Analysis Voice over IP Tactics WannaCry Server Management Error instant Messaging Hard Drives Trends Big Data Sales BYOD Bring Your Own Device Server SaaS Edge Virus Millennials Troubleshooting Health disposal OneNote Printing HP Authorization Chrome OS Mobile Security Microsoft Teams Settings HIPAA Vulnerabilities SSD A.I. Tablet Plug-In Wireless Internet Employees Hybrid Cloud Conferencing GDPR Antivirus Business Technology Update Training Windows Server 2008 R2 Dongle Paper Document Management Telecommute Operating System IT budget Maintenance Hard Drive Touchscreen Cryptocurrency Movies Physical Security Proactive IT Excel Help Desk Solid State Drive Cables Lead Generation Network Attached Storage Personal Information Technology Tips Staff Outlook Security Cameras Taskbar Ink Telecommuting Human Resources Managing Stress Battery Hard Disk Drive Router Processors Tip of the week Microsoft Office 365 Windows 7 Twitter eCommerce Laptop Knowledge Business Continuity Database Content Filtering Storage E-Commerce Streaming Media Phishing Profitability Comparison Reporting Word National Security Government PowerPoint Digital Data loss Employee-Employer Relationship Environment Video Websites Internet Explorer Vulnerability Machine Learning User Tip Time Management Inventory Unified Communications Online Shopping Cybercrime Dark Web Payment Backup and Disaster Recovery Downloads Amazon Data Breach Eliminating Downtime IT Management Specifications Wearables Sports Spam Workers Electronic Health Records e-waste Updates Alert Quick Tips Regulation Disaster Recovery Windows Printers