1.888.749.9800

Monthly Archives: June 2015

Always-on Access Brings Always-Threatening Security Risks

Always-on access to work for employees comes with always-threatening security risks

One of the controls that appears in ISO 27002, titled Information technology – Security techniques – Code of practice for information security management, suggests  that limiting the period during which connections to computer services are allowed reduces the window of opportunity for unauthorized access.  However, the current […]

By |June 25th, 2015|Blog, BYOD, ISO 27002|Comments Off on Always-on Access Brings Always-Threatening Security Risks
  • Permalink Gallery

    BYOD Security: Expert Tips on Policy, Mitigating Risks, & Preventing a Breach

BYOD Security: Expert Tips on Policy, Mitigating Risks, & Preventing a Breach

by Nate Lord, Digital Guardian, June 3, 2015

Despite all of the security risks BYOD poses to an IT environment, the trend of businesses embracing bring your own device in the workplace continues to grow at a rapid pace.

Some of the main reasons companies of today are so accepting of BYOD in the workplace usually relates to employee […]

By |June 18th, 2015|BYOD, News & Events|Comments Off on BYOD Security: Expert Tips on Policy, Mitigating Risks, & Preventing a Breach
  • Permalink Gallery

    Steps Enterprises Should Take to Eliminate Website Vulnerabilities

Steps Enterprises Should Take to Eliminate Website Vulnerabilities

It’s understood that security is not an endpoint. It is a process that requires constant vigilance, reassessment and evolutionary change.

The security of a website is no exception. Most websites continue to have security vulnerabilities because the primary focus tends to be on application functionality and not security. Application developers are incented to finish updates quickly and often don’t understand […]

By |June 2nd, 2015|Blog|Comments Off on Steps Enterprises Should Take to Eliminate Website Vulnerabilities