As the popularity of smartphones rises, we must be ready for the rise in the popularity of smartphone cyber attacks. Many people forget that they are essentially carrying around a mini computer in their pockets; smartphone users can download apps, open mail, surf the internet and even make financial transactions on their phones from basically […]
Secure360 Blog
Information security and privacy management in healthcare
Historically, organizations that outsourced have pretty much done just one thing to ensure their outsourced business partners would appropriately protect the information with which they had been entrusted access or possession: Include a brief information security clause with no details to speak of. Oh, and also include a lengthier “No Liability,” or “Limited Liability,” clause […]
IT collaboration: tools and trends
According to Computerworld, 42% of companies are actively implementing collaboration technologies. IT mobility and collaboration is hot. Let’s take a look at the tools and trends seeing the most activity. Mo money Collaboration and mobility are trending, companies are doing it, and that means a dedicated budget for implementing these tools. It’s hard to go […]
3 factors of fail: The authentication problem
The following post was originally written for Security and Coffee. It is part one in a series by Barry Caplin, Secure360 Conference speaker. Authentication is one of the biggest challenges in information security. We can have all kinds of technical security measures in our systems. There are various controls we can have at the data […]
The disaster recovery needs of today’s businesses
Disaster Recovery (DR) is something every business should have a plan for. It’s something no one wants to think about, but everyone should do. DR covers many different areas, however we’ll focuses specifically on the IT or technology that supports how your business processes data. Having a disaster recovery plan in place means that your business […]
5 mistakes of vital records protection
A Gartner report from 2002 showed that 40% of small and midsized businesses folded within five years after sudden misfortune struck. Having your important information where you need it when you need it, could save you from going under. Don’t let insurance policies lull you into feeling safe against disaster that could destroy your files: […]
From the basement to the board room: Records management’s evolution
When I say from the basement, I mean from the basement. As a newly degreed Records and Information Management (RIM) professional, fresh out of college and ready to apply the knowledge I had gained in countless courses (and while working on myriad of projects), I jumped at the chance for a paid RIM internship in […]
Putting trust in cloud computing
Cloud computing is changing the way companies do business. Instead of housing all of your data and IT components on-site, business professionals are now moving to host and store their information over a network—the cloud. Whether you have all of your IT resources in the cloud or you are just looking to move a few […]
Business in the crosshairs of cyber criminals – protecting your digital assets, part 2
This is part two of a two-part series on protecting digital assets. In my previous post, I talked about the importance of physical security, Internet security and data security when it comes to protecting your digital assets as a small or mid-sized business. As a small business owner, the importance of protecting your company from […]
Business in the crosshairs of cyber criminals – protecting your digital assets, part 1
This is part one in a two-part series on protecting digital assets. Many computer criminals are targeting small and medium size businesses because they have more valuable assets to steal than consumers, and their security is generally much weaker than large enterprise companies. A small business represents a fat and easy victim to criminal hackers. […]