These last posts covered a lot of ground: cyber security, data breaches, email security, cloud computing, and we only scratched the surface of each topic. Based on just this cursory overview, you should be doing the following: Securing your equipment and network Backing up your data. Talking to any service providers you use, such as credit card processors, and finding out what they’re doing to secure your transactions and data. Reviewing (or creating) your policies on Permitted software Passwords Who should access the company’s network and devices Working at remote locations Physically...