1.888.749.9800

Monthly Archives: July 2015

  • Permalink Gallery

    Communicating the Data Security Risks of File Sharing & Cloud Storage

Communicating the Data Security Risks of File Sharing & Cloud Storage

by Nate Lord, Digital Guardian, July 23, 2015

With more enterprises moving to the cloud and more employees using file sharing and cloud storage services in the course of conducting business, effective communication regarding the inherent security risks associated with cloud computing is imperative. Cloud applications enable employees to create, store, and control more data than ever before, […]

By |July 23rd, 2015|News & Events|Comments Off on Communicating the Data Security Risks of File Sharing & Cloud Storage

How to Avoid Bug Management Mistakes

I was recently asked to comment on some of the most common bug management mistakes enterprises make and how to avoid these issues. I have found that one of the most common mistakes is the failure to track vulnerabilities that have been deemed an acceptable risk and left unpatched.

There are many reasons why an organization may decide to postpone […]

By |July 21st, 2015|Blog|Comments Off on How to Avoid Bug Management Mistakes
  • Permalink Gallery

    Device Settings that Help Prevent Unauthorized Information Disclosure

Device Settings that Help Prevent Unauthorized Information Disclosure

Following up on my recent post (“Always-on access, brings always threatening security risks”) I’d like to continue the conversation and discuss other device settings that help prevent unauthorized information disclosure.

Many organizations overlook the risks posed by Bluetooth. The security of Bluetooth has been slowly increasing over the years.  When it first appeared many devices had a hardcoded PIN of […]

By |July 13th, 2015|Blog, BYOD, ISO 27002|Comments Off on Device Settings that Help Prevent Unauthorized Information Disclosure