All You Need
In One Single
Theme.
Search here:

Blog

Home > Blog

So you feel relatively comfortable that you have created cyber security around your data and your employees are trained to avoid security errors in their day-to-day business ( a MAJOR source of security breaches, by the way.) However, you may be overlooking one area where you are exceptionally vulnerable. What protection do you have from those you do business with? If you are a manufacturer, for example, you may have several vendors who provide components and raw materials. How careful...

You can have all the locks on your data center and have all the network security available, but nothing will keep your data safe if your employees are careless with passwords. Change Passwords - Most security experts recommend that companies change out all passwords every 30 to 90 days. Require passwords that mix upper and lowercase, number, and a symbol. Teach employees NOT to use standard dictionary words ( in any...

If you are a smaller Not-for-Profit, it is likely that your organization has been driven from its inception by individuals strongly motivated with a passion for their cause or humanitarian goal. As a result, it is also possible that the leadership has little interest in developing the administrative technology infrastructure that is necessary for any organization to function in the internet age.Failure to understand and focus on technology can damage an organization's growth and success. However, NPO leadership has to...

Did you know the illicit trading of personal data was worth $3.88 billion last year? Cybercrime is a growing industry known for its innovation. It goes far beyond the image many of us have of some hacker kid in his basement. Many who engage in this activity are professionals and work in large teams. Some may even be sponsored by governments. If you follow the news, you can find large corporations and even government agencies who have fallen prey to...

Organizational Issues that are making IoT a security riskSomething unusual has happened with the incorporation of IoT technology into business organizations: it is breaking down the dominance of the IT department as the sole custodian of all things tech. This is because IoT technology is tending to be introduced by operation lines and not initiated by the IT department. Line of Business managers are discovering individual IoT technologies that solve specific problems and initiating their use. As a result, IT...