All You Need
In One Single
Theme.
Search here:

Blog

Home > Blog (Page 17)

You can have all the locks on your data center and have all the network security available, but nothing will keep your data safe if your employees are careless with passwords. Change Passwords - Most security experts recommend that companies change out all passwords every 30 to 90 days. Require passwords that mix upper and lowercase, number, and a symbol. Teach employees NOT to use standard dictionary words ( in any...

If you are a smaller Not-for-Profit, it is likely that your organization has been driven from its inception by individuals strongly motivated with a passion for their cause or humanitarian goal. As a result, it is also possible that the leadership has little interest in developing the administrative technology infrastructure that is necessary for any organization to function in the internet age.Failure to understand and focus on technology can damage an organization's growth and success. However, NPO leadership has to...

Did you know the illicit trading of personal data was worth $3.88 billion last year? Cybercrime is a growing industry known for its innovation. It goes far beyond the image many of us have of some hacker kid in his basement. Many who engage in this activity are professionals and work in large teams. Some may even be sponsored by governments. If you follow the news, you can find large corporations and even government agencies who have fallen prey to...

Organizational Issues that are making IoT a security riskSomething unusual has happened with the incorporation of IoT technology into business organizations: it is breaking down the dominance of the IT department as the sole custodian of all things tech. This is because IoT technology is tending to be introduced by operation lines and not initiated by the IT department. Line of Business managers are discovering individual IoT technologies that solve specific problems and initiating their use. As a result, IT...

New security liabilities: The Internet of ThingsIn previous blogs we have addressed the data security concerns that arise out of the inherent nature of IoT. However, there are other factors that create new security concerns.First, since many of these devices were designed to solve specific LOB needs, they may be designed for functionality first and security a distant second. And in many cases, they may not be designed with the capacity to restrict access to the data that is collected....