Entries by Steve McGee

Security compliance: How much is enough?

by Michael O’Dwyer, contributor, The PULSE of IT, November 23, 2015 Excerpt: Businesses should take baby steps when it comes to security compliance, starting with a security standard that is easier to comply with, like the ISO/IEC 27002, which deals with end-to-end security. “It is easy to understand, and it is up to the company to determine […]

Identity and Access Management – All access pass

An SC Magazine eBook Publication – Identity Access Management, by Karen Epper Hoffman, October 2015 Security executives are looking beyond basic user name and password to secure access to the enterprise, which is becoming more complicated with remote access, cloud services and personal devices. Knowing who is on your network and able to access your information and resources is arguably […]

Hacking your back pocket

by Sue Poremba, security and technology writer, Central Desktop, a PGi company, October 27, 2015 Convenient, but vulnerable There are two primary reasons why your smartphone is more likely to be hacked than other devices, according to Paul Hill, senior consultant with SystemExperts: the physical security of the devices and the use of untrustworthy networks. […]

Holiday Marketing Guide: 2015 Trends That Will Drive Sales

Nicole Fallon Taylor, Business News Daily Assistant Editor September 28, 2015  With two months to go before Thanksgiving, shoppers are already gearing up for a busy holiday sale season. Data from Google revealed that more than a quarter of consumers begin their holiday shopping before Halloween, so retailers need to be ready for the rush. […]

9 common enterprise cybersecurity myths

Joe Stangarone, writer,  MRCs Cup of Joe Blog, August 4, 2015 Summary: Cyberattacks are more sophisticated and frequent than ever. The costs to recover from a data breach are now higher than ever. Yet, many companies remain unprepared for an attack. Why? In many cases, they believe some common cybersecurity myths, which can put their data […]

Communicating the Data Security Risks of File Sharing & Cloud Storage

by Nate Lord, Digital Guardian, July 23, 2015 With more enterprises moving to the cloud and more employees using file sharing and cloud storage services in the course of conducting business, effective communication regarding the inherent security risks associated with cloud computing is imperative. Cloud applications enable employees to create, store, and control more data […]

8 Android security tips for IT, corporate users

By James A. Martin, CIO.com, May 20, 2015 A set of security experts shares actionable tips for IT departments and users to help reduce the risk associated with the popular mobile OS. The security pros interviewed for our article, “Experts bust Android security myths,” offered up the following eight Android security tips for IT administrators […]