Entries by System Experts

Firm’s Data Storage Plan Out of This World

by Garrett Reim,  Los Angeles Business Journal, January 27, 2017 INTERNET: Startups look to satellites for higher security. Cloud Constellation Corp. has a far-flung idea. As businesses and governments consider ways to protect data in light of increased cyberattacks and surveillance, the startup is offering them a chance to put their information out of reach […]

How to Secure Intellectual Property from Loss or Compromise

by Nate Lord, Digital Guardian, January 10, 2017 Data Protection experts weigh in with tips on securing intellectual property in its many forms. Intellectual property is often among an organization’s most valuable assets, yet it’s also vulnerable to threat and compromise, particularly the vast amounts of intellectual property stored electronically today. Intellectual property can take […]

Want a board-level cybersecurity expert? They’re hard to find

by Alan R. Earls, TechTarget, SearchSecurity, November 16, 2016 Members of the board must be ready to defend their fiduciary decisions, corporate policies, compliance actions and, soon, cybersecurity preparedness. Pity the corporate board. Not that long ago, many boards of directors had a relatively sleepy existence, proffering guidance from time to time, but actually taking action only […]

Risks of Plugging a Smartphone Into a Public USB Port

As smartphones continue to increase in popularity, people can find USB charging stations in almost any location. From airports to malls, businesses are offering their customers a convenient way to keep a full charge. Without much thought, most people are quick to plug their devices into any random USB port that they might find, but […]

Social Media Security Tips and Best Practices

In response to a recent query about security pitfalls surrounding social media, Jonathan Shuffler and I came up with the following tips and best practices: When setting account security questions, do not use real answers.  A lot of security questions ask publicly available information, e.g., What is your favorite sports team?  An attacker would need only […]

Down but not out of options: How to keep IT security together in a company that’s gone bankrupt

by Josh Fruhlinger, CSO, October 7, 2016 Corporate chaos The supply chain upon which modern multinational commerce depends was thrown into chaos earlier this year when South Korea’s Hanjin Shipping filed for bankruptcy. Dozens of container ships with hundreds of crew and thousands of pounds of cargo onboard were essentially stranded at sea, as ports […]

Cyber Security Investments: Experts Discuss Detection vs. Prevention

by Nate Lord, Digital Guardian, September 26, 2016 Detection or prevention? 36 security pros and IT experts share their top recommendations for prioritizing security investments. Enterprises are increasingly aware of the growing need to invest in sound security measures capable of securing valuable company data in the ever-evolving threat landscape. But in the face of […]

A future ‘hot target’ for attackers: How construction companies can improve cybersecurity

by Kim Slowey, Construction DIVE, August 11, 2016 Construction companies are infamous for their reluctance to adopt the latest technologies. Most of the largest companies have made the leap, but for small and mid-sized firms, the process continues inch by inch. However, as contractors join the digital age and begin to reap the benefits of […]