1.888.749.9800

Monthly Archives: September 2014

How Do I Secure Sensitive Data?

How do I secure sensitive data?  The first step is knowing where your sensitive data resides. Second is having set policies to systematically and consistently categorize the data and having controls in place to ensure that all categories of data are handled appropriately.

For example, if a company had a policy that said that any dataset that contain personally identifying […]

By |September 29th, 2014|Blog, Penetration Testing|Comments Off on How Do I Secure Sensitive Data?

7 more security tips for mobile users (Part II)

Joe Stangarone, writer,  MRCs Cup of Joe Blog, September 9, 2014

Summary: Users have notoriously bad security habits. The problem is, many of these users are now bringing their personal devices–and their poor security habits–into the workplace. Learn how these users can better protect themselves (and your data) with these simple tips.

By |September 9th, 2014|News & Events, Penetration Testing|Comments Off on 7 more security tips for mobile users (Part II)