1.888.749.9800

Monthly Archives: March 2016

How Shadow IT Fits in Today’s IT Organizations

For those old enough to remember, the controversy surrounding shadow IT in the cloud computing world recalls a time when personal computers and spreadsheets first threatened the IT mini and mainframe priesthood. The motivations seem very much the same: business users want solutions quickly, and want to try different tools and methods now instead of going through […]

By |March 29th, 2016|Blog, Security Breach|Comments Off on How Shadow IT Fits in Today’s IT Organizations
  • Permalink Gallery

    Encryption Implementation: Is It the Cure-all for Cybersecurity Woes?

Encryption Implementation: Is It the Cure-all for Cybersecurity Woes?

Based on the science of cryptography, encryption is the process of coding and decoding messages to keep them secure, and is often touted as the silver bullet for cybersecurity woes. But is it really the cure-all?

The classic model of information security starts with the triad of Confidentiality, Integrity, and Availability. Cryptography is critical to providing […]

By |March 15th, 2016|Blog, Security Breach|Comments Off on Encryption Implementation: Is It the Cure-all for Cybersecurity Woes?
  • Permalink Gallery

    Who Should Be Able to Opt Out of Security Awareness training – and How

Who Should Be Able to Opt Out of Security Awareness training – and How

by Ian Palmer, researcher for InfoSec Institute, March 9, 2016

Brad Johnson is adamant that no one in an organization should be exempt from security awareness training. Not the CEO. Not the chief security officer. Nobody.

Johnson, the vice president of SystemExperts, says that making exceptions on the security awareness training front would only open companies […]

By |March 10th, 2016|News & Events, Security Breach|Comments Off on Who Should Be Able to Opt Out of Security Awareness training – and How