While it seems as though everything is captured online in some way, shape or form, there’s a proper way to create documents and records. In order to protect your security and business, documents and records should be managed and created to adhere to legal and privacy standards. A best practice in the industry, properly managing […]
Cybersecurity
Protect yourself from DDoS attacks
A recent report by Arbor Networks shows that Distributed denial of Service (DDoS) attacks are up: an increase in attack size, speed and complexity . Over half of all attacks are now over 1Gbps, attacks between 2 and 10Bbps doubled and those over 10Bbps have increased by 41.6%. Attacks are solidly above 2Gbps for the […]
BYOD: Avoiding Disaster
A ‘perk of employment’ trend is growing in popularity with businesses of all varieties: offering portable or mobile devices for both personal and work use. In fact 62% of companies will allow BYOD (bring your own device) by the end of 2013. While the intentions are good, the security implications can be catastrophic if a […]
Information security vs. spying
Whether you belong to a private or government organization, everyone can agree that information security is paramount to your success. Guarding your data should be a top concern for not only your company but also stakeholders or users. In the digital age where it seems like more and more personal information is readily available, following […]
Managing the cloud: Tenant issues
Using multi-tenancy public cloud space to store your data can provide companies a cost effective way to store data that comes with rapid access to new technology and good support. However, despite all the advantages of using a shared cloud, if something about a multi-tenant cloud makes you nervous, you’re not alone. With multiple tenants […]
Is mobile affecting your IT business strategy?
Attitudes about technology in the workplace are shifting. It used to be people would show up for a job and ask what devices they should use, what was supported. Now, employees show up with their own devices and expect multiple platforms and operating systems will all be supported. Mobile is increasingly influencing mainstream IT. Employees […]
Struggling to define your organization’s security requirements? Start here.
Prepare yourself for a harsh truth; technology cannot always protect you. In fact, a large amount of attacks are aided by a company’s lack of requirements and restrictions, not the lack of the newest software. When creating a security plan you need to build your strategy from the ground up by beginning with finding where […]
Our future leaders – They come in all sizes, shapes and yes….ages
Security affects almost everyone. We encounter security as we walk into a bank, when we walk down streets, as we surf the Web, as we lock our cars before going to work. Security issues and risks present themselves to us in almost every facet of our lives, and more importantly at increasingly earlier stages of […]
Emergency response plan? Don’t forget these 5 tips
Being really good at emergency response takes practice, and since most of us don’t have that experience, preparedness is the next best thing. We might prefer to think about what we’ll do when fortune strikes, but thinking about an emergency response plan before a catastrophe may be the only difference between recovery and losing your […]
Outsourcing information security: The risks and benefits
If the thought of information security scares you, you are not alone. Unfortunately, despite the fear, information security often gets very little attention. Due to the lack of resources, companies often shove the task of internet security on under-qualified individuals who already have full-time jobs. If this is the case at your company, it may […]