With the growing acceptance of BYOD and the almost imminent threat of a cyber hack, companies are forced to rework their business continuity plans (BCP) to focus on ways to lessen the chances of a cyber attack and plan on how to respond if the company’s systems are hacked. In fact, companies are taking the […]
Secure360 Blog
BYOD: Avoiding Disaster
A ‘perk of employment’ trend is growing in popularity with businesses of all varieties: offering portable or mobile devices for both personal and work use. In fact 62% of companies will allow BYOD (bring your own device) by the end of 2013. While the intentions are good, the security implications can be catastrophic if a […]
Risk Management: Learning by example
When you’re in the field of risk management, you’re dealing with uncertainty. That’s probably why it’s difficult for some companies to really embrace and focus on risk management as a path to success. However, we do know for certain that risk management has worked in the past, and there are lessons in that for us. […]
Information security vs. spying
Whether you belong to a private or government organization, everyone can agree that information security is paramount to your success. Guarding your data should be a top concern for not only your company but also stakeholders or users. In the digital age where it seems like more and more personal information is readily available, following […]
Managing the cloud: Tenant issues
Using multi-tenancy public cloud space to store your data can provide companies a cost effective way to store data that comes with rapid access to new technology and good support. However, despite all the advantages of using a shared cloud, if something about a multi-tenant cloud makes you nervous, you’re not alone. With multiple tenants […]
4 signs your business continuity plan is in trouble
A good business continuity plan (BCP) will keep your business functioning through any incident, such as disasters, accidents, or emergencies. Unfortunately, because of the infrequent use of the plan, it is often neglected. Of course, companies keep it “up-to-date” enough to satisfy regulatory standards, or to avoid audits, but that bare minimum is not enough […]
Is mobile affecting your IT business strategy?
Attitudes about technology in the workplace are shifting. It used to be people would show up for a job and ask what devices they should use, what was supported. Now, employees show up with their own devices and expect multiple platforms and operating systems will all be supported. Mobile is increasingly influencing mainstream IT. Employees […]
Struggling to define your organization’s security requirements? Start here.
Prepare yourself for a harsh truth; technology cannot always protect you. In fact, a large amount of attacks are aided by a company’s lack of requirements and restrictions, not the lack of the newest software. When creating a security plan you need to build your strategy from the ground up by beginning with finding where […]
Our future leaders – They come in all sizes, shapes and yes….ages
Security affects almost everyone. We encounter security as we walk into a bank, when we walk down streets, as we surf the Web, as we lock our cars before going to work. Security issues and risks present themselves to us in almost every facet of our lives, and more importantly at increasingly earlier stages of […]
Thanks for a great 2013 Secure360 Conference!
We had another successful Secure360 conference this year. We brought together over 1,200 attendees–professionals including executive level leaders, directors, mid-level managers, technology personnel and consultants from all over the security world to discuss topics ranging from physical security to cyberwarfare. We hosted more than 90 sponsors and exhibitors. There was a lot of energy and more […]