• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Student360
  • About
    • Secure360
    • UMSA
  • Secure360 2022
  • For Sponsors
  • For Speakers
  • Get Involved
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

Secure360 Blog

Protecting your smartphone from cyber attacks

April 1, 2013 by Secure360 and UMSA

As the popularity of smartphones rises, we must be ready for the rise in the popularity of smartphone cyber attacks. Many people forget that they are essentially carrying around a mini computer in their pockets; smartphone users can download apps, open mail, surf the internet and even make financial transactions on their phones from basically […]

Filed Under: Cybersecurity

Information security and privacy management in healthcare

March 28, 2013 by Rebecca Herold

Historically, organizations that outsourced have pretty much done just one thing to ensure their outsourced business partners would appropriately protect the information with which they had been entrusted access or possession: Include a brief information security clause with no details to speak of. Oh, and also include a lengthier “No Liability,” or “Limited Liability,” clause […]

Filed Under: Guest Posts

IT collaboration: tools and trends

March 25, 2013 by Secure360 and UMSA

According to Computerworld, 42% of companies are actively implementing collaboration technologies. IT mobility and collaboration is hot. Let’s take a look at the tools and trends seeing the most activity. Mo money Collaboration and mobility are trending, companies are doing it, and that means a dedicated budget for implementing these tools. It’s hard to go […]

Filed Under: Business Continuity Management, Cybersecurity

3 factors of fail: The authentication problem

March 14, 2013 by Barry Caplin

The following post was originally written for Security and Coffee. It is part one in a series by Barry Caplin, Secure360 Conference speaker. Authentication is one of the biggest challenges in information security. We can have all kinds of technical security measures in our systems. There are various controls we can have at the data […]

Filed Under: Guest Posts

The disaster recovery needs of today’s businesses

February 27, 2013 by Secure360 and UMSA

Disaster Recovery (DR) is something every business should have a plan for. It’s something no one wants to think about, but everyone should do. DR covers many different areas, however we’ll focuses specifically on the IT or technology that supports how your business processes data. Having a disaster recovery plan in place means that your business […]

Filed Under: Business Continuity Management, Cybersecurity, Risk and Compliance

5 mistakes of vital records protection

February 25, 2013 by Secure360 and UMSA

A Gartner report from 2002 showed that 40% of small and midsized businesses folded within five years after sudden misfortune struck. Having your important information where you need it when you need it, could save you from going under. Don’t let insurance policies lull you into feeling safe against disaster that could destroy your files: […]

Filed Under: Business Continuity Management

From the basement to the board room: Records management’s evolution

February 12, 2013 by Beth Zaspel

When I say from the basement, I mean from the basement.  As a newly degreed Records and Information Management (RIM) professional, fresh out of college and ready to apply the knowledge I had gained in countless courses (and while working on myriad of projects), I jumped at the chance for a paid RIM internship in […]

Filed Under: Guest Posts

Putting trust in cloud computing

January 30, 2013 by Secure360 and UMSA

Cloud computing is changing the way companies do business. Instead of housing all of your data and IT components on-site, business professionals are now moving to host and store their information over a network—the cloud. Whether you have all of your IT resources in the cloud or you are just looking to move a few […]

Filed Under: Business Continuity Management, Cybersecurity, Risk and Compliance

Business in the crosshairs of cyber criminals – protecting your digital assets, part 2

January 15, 2013 by Bob Weiss

This is part two of a two-part series on protecting digital assets. In my previous post, I talked about the importance of physical security, Internet security and data security when it comes to protecting your digital assets as a small or mid-sized business. As a small business owner, the importance of protecting your company from […]

Filed Under: Guest Posts

Business in the crosshairs of cyber criminals – protecting your digital assets, part 1

January 11, 2013 by Bob Weiss

This is part one in a two-part series on protecting digital assets. Many computer criminals are targeting small and medium size businesses because they have more valuable assets to steal than consumers, and their security is generally much weaker than large enterprise companies. A small business represents a fat and easy victim to criminal hackers.  […]

Filed Under: Guest Posts

  • « Go to Previous Page
  • Go to page 1
  • Interim pages omitted …
  • Go to page 41
  • Go to page 42
  • Go to page 43
  • Go to page 44
  • Go to page 45
  • Go to Next Page »

Primary Sidebar

Categories

  • Uncategorized
  • Guest Posts
  • Business Continuity Management
  • News and Events
  • Physical Security
  • Cybersecurity
  • Professional Development
  • Risk and Compliance

latest tweets

  1. smallarmy
    smallarmy: @TylerCohenWood @Secure360 Good
    about 1 day ago

  2. Secure360 Conference
    Secure360 Conference: Woo hoo!! Thanks to everyone who donated and for those who would still like to, you can do so at… https://t.co/jW3EsvOAFp
    about 1 day ago

  3. Bryghtpath LLC
    Bryghtpath LLC: Bryghtpath CEO @bryanstrawser presented last week at the @Secure360 Conference on "Navigating the Ransomware Challe… https://t.co/iXa3JeRKNN
    about 3 days ago

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2022 Secure360. All rights reserved.