1.888.749.9800

Monthly Archives: May 2015

8 Android security tips for IT, corporate users

By James A. Martin, CIO.com, May 20, 2015

A set of security experts shares actionable tips for IT departments and users to help reduce the risk associated with the popular mobile OS.

The security pros interviewed for our article, “Experts bust Android security myths,” offered up the following eight Android security tips for IT administrators and users:

1) Don’t […]

By |May 26th, 2015|News & Events|Comments Off on 8 Android security tips for IT, corporate users
  • Permalink Gallery

    Data Leak Prevention Tools: Experts Reveal The Biggest Mistake Companies Make Purchasing & Implementing Data Leak Prevention Software

Data Leak Prevention Tools: Experts Reveal The Biggest Mistake Companies Make Purchasing & Implementing Data Leak Prevention Software

By Nate Lord, Digital Guardian, May 14, 2015

Due to their size, enterprises have many security issues to consider when establishing a comprehensive data security strategy. One security need that is especially critical for larger companies – because they typically have many employees and large volumes of sensitive data – is proper data leak prevention.

As a provider of […]

By |May 14th, 2015|News & Events|Comments Off on Data Leak Prevention Tools: Experts Reveal The Biggest Mistake Companies Make Purchasing & Implementing Data Leak Prevention Software

Security Questions to Ask a Cloud Service Provider

Ericka Chickowski of Dark Reading recently asked security experts to contribute key questions to ask a cloud security provider. While I’m please that two of my questions were included in the article , I have three additional questions you should ask to help you assess the risks of cloud services.

1) What security compliance programs and audits do you […]

By |May 14th, 2015|Blog|Comments Off on Security Questions to Ask a Cloud Service Provider

10 Security Questions To Ask A Cloud Service Provider

By Erika Chickowski, Contributing Writer, Dark Reading, May 12, 2015

Erika Chickowski of Dark Reading posted a slideshow of the most important security questions companies should ask cloud providers in order to evaluate the risk of using that service. Paul Hill, senior consultant, SystemExperts, contributed two questions for the article:

Do you encrypt all data transmissions, including all server-to-server data transmissions, […]

By |May 12th, 2015|News & Events|Comments Off on 10 Security Questions To Ask A Cloud Service Provider
  • Permalink Gallery

    Key Steps Enterprise IT Can Take to Safeguard its Operations

Key Steps Enterprise IT Can Take to Safeguard its Operations

IT systems pervade enterprises.  Systems are increasingly complex; enterprises constantly seek more rapid deployments.  And enterprises are increasing the volume and diversity of the data collected and analyzed. All of these factors mean that enterprises cannot rely on a small set of steps to safeguard its operations. Well established security frameworks such as PCI, HIPAA, ISO 27002 […]

By |May 1st, 2015|Blog, ISO 27002, PCI Compliance, Uncategorized|Comments Off on Key Steps Enterprise IT Can Take to Safeguard its Operations