1.888.749.9800

Monthly Archives: March 2015

  • Permalink Gallery

    Why Securing Only the Network Perimeter is the Wrong Approach

Why Securing Only the Network Perimeter is the Wrong Approach

Every time I encounter an organization that focuses on perimeter security while ignoring best practices on the internal network I think of Gary Larson’s Far Side cartoon where two polar bears are on either side of an igloo and one says to the other, “Oh hey! I just love these things!…Crunchy on the outside and a chewy center!”

Perimeters have […]

By |March 30th, 2015|Big Data, Blog|Comments Off on Why Securing Only the Network Perimeter is the Wrong Approach

Is your business data really secure?

Joe Stangarone, writer,  MRCs Cup of Joe Blog, March 24, 2015

Summary: With data breaches on the rise, security becomes more important than ever. Is your company (unwittingly) putting your data at risk? Are you following best practices for data security? Learn 7 ways to better secure your data.

They say that “any press is good press.” But, I’d guess that any […]

By |March 25th, 2015|News & Events|Comments Off on Is your business data really secure?

Data Leak Prevention Tools: Biggest Mistakes Companies Make

I was recently asked to comment on mistakes companies make in purchasing and implementing data leak prevention tools (DLP). Although we have been talking about DLP for quite some time,  it continues to be a challenging issue for many companies. In my experience, the mistakes companies make fall into the following categories:

  •  inadequate risk analysis prior […]
By |March 17th, 2015|Blog|Comments Off on Data Leak Prevention Tools: Biggest Mistakes Companies Make