1.888.749.9800

News & Events

Identity and Access Management – All access pass

An SC Magazine eBook Publication – Identity Access Management, by Karen Epper Hoffman, October 2015

Security executives are looking beyond basic user name and password to secure access to the enterprise, which is becoming more complicated with remote access, cloud services and personal devices.

Knowing who is on your network and able to access your information and resources is arguably the basic foundation on which good enterprise […]

By |October 30th, 2015|News & Events|Comments Off on Identity and Access Management – All access pass

Hacking your back pocket

by Sue Poremba, security and technology writer, Central Desktop, a PGi company, October 27, 2015

Convenient, but vulnerable

There are two primary reasons why your smartphone is more likely to be hacked than other devices, according to Paul Hill, senior consultant with SystemExperts: the physical security of the devices and the use of untrustworthy networks.

“Mobile devices are more likely […]

By |October 28th, 2015|News & Events|Comments Off on Hacking your back pocket

Holiday Marketing Guide: 2015 Trends That Will Drive Sales

Nicole Fallon Taylor, Business News Daily Assistant Editor  

With two months to go before Thanksgiving, shoppers are already gearing up for a busy holiday sale season. Data from Google revealed that more than a quarter of consumers begin their holiday shopping before Halloween, so retailers need to be ready for […]

By |September 30th, 2015|News & Events|Comments Off on Holiday Marketing Guide: 2015 Trends That Will Drive Sales

9 common enterprise cybersecurity myths

Joe Stangarone, writer,  MRCs Cup of Joe Blog, August 4, 2015

Summary: Cyberattacks are more sophisticated and frequent than ever. The costs to recover from a data breach are now higher than ever. Yet, many companies remain unprepared for an attack. Why? In many cases, they believe some common cybersecurity myths, which can put their data (and their customer’s […]

By |August 4th, 2015|ISO 27002, News & Events, Uncategorized|Comments Off on 9 common enterprise cybersecurity myths
  • Permalink Gallery

    Communicating the Data Security Risks of File Sharing & Cloud Storage

Communicating the Data Security Risks of File Sharing & Cloud Storage

by Nate Lord, Digital Guardian, July 23, 2015

With more enterprises moving to the cloud and more employees using file sharing and cloud storage services in the course of conducting business, effective communication regarding the inherent security risks associated with cloud computing is imperative. Cloud applications enable employees to create, store, and control more data than ever before, […]

By |July 23rd, 2015|News & Events|Comments Off on Communicating the Data Security Risks of File Sharing & Cloud Storage
  • Permalink Gallery

    BYOD Security: Expert Tips on Policy, Mitigating Risks, & Preventing a Breach

BYOD Security: Expert Tips on Policy, Mitigating Risks, & Preventing a Breach

by Nate Lord, Digital Guardian, June 3, 2015

Despite all of the security risks BYOD poses to an IT environment, the trend of businesses embracing bring your own device in the workplace continues to grow at a rapid pace.

Some of the main reasons companies of today are so accepting of BYOD in the workplace usually relates to employee […]

By |June 18th, 2015|BYOD, News & Events|Comments Off on BYOD Security: Expert Tips on Policy, Mitigating Risks, & Preventing a Breach

8 Android security tips for IT, corporate users

By James A. Martin, CIO.com, May 20, 2015

A set of security experts shares actionable tips for IT departments and users to help reduce the risk associated with the popular mobile OS.

The security pros interviewed for our article, “Experts bust Android security myths,” offered up the following eight Android security tips for IT administrators and users:

1) Don’t […]

By |May 26th, 2015|News & Events|Comments Off on 8 Android security tips for IT, corporate users
  • Permalink Gallery

    Data Leak Prevention Tools: Experts Reveal The Biggest Mistake Companies Make Purchasing & Implementing Data Leak Prevention Software

Data Leak Prevention Tools: Experts Reveal The Biggest Mistake Companies Make Purchasing & Implementing Data Leak Prevention Software

By Nate Lord, Digital Guardian, May 14, 2015

Due to their size, enterprises have many security issues to consider when establishing a comprehensive data security strategy. One security need that is especially critical for larger companies – because they typically have many employees and large volumes of sensitive data – is proper data leak prevention.

As a provider of […]

By |May 14th, 2015|News & Events|Comments Off on Data Leak Prevention Tools: Experts Reveal The Biggest Mistake Companies Make Purchasing & Implementing Data Leak Prevention Software

10 Security Questions To Ask A Cloud Service Provider

By Erika Chickowski, Contributing Writer, Dark Reading, May 12, 2015

Erika Chickowski of Dark Reading posted a slideshow of the most important security questions companies should ask cloud providers in order to evaluate the risk of using that service. Paul Hill, senior consultant, SystemExperts, contributed two questions for the article:

Do you encrypt all data transmissions, including all server-to-server data transmissions, […]

By |May 12th, 2015|News & Events|Comments Off on 10 Security Questions To Ask A Cloud Service Provider

Is your business data really secure?

Joe Stangarone, writer,  MRCs Cup of Joe Blog, March 24, 2015

Summary: With data breaches on the rise, security becomes more important than ever. Is your company (unwittingly) putting your data at risk? Are you following best practices for data security? Learn 7 ways to better secure your data.

They say that “any press is good press.” But, I’d guess that any […]

By |March 25th, 2015|News & Events|Comments Off on Is your business data really secure?
  • Permalink Gallery

    SMB Awareness of Breach Notification Laws IndustryView | 2015

SMB Awareness of Breach Notification Laws IndustryView | 2015

by Daniel Humphries, Managing Editor for IT Security research firmSoftware Advice, February, 2015

Currently, 47 U.S. states have security breach notification laws, which require organizations that store sensitive information to notify customers and clients if their personal data is breached. In this report, we investigate how aware decision-makers at small and midsize businesses (SMBs) are of the laws that apply […]

By |February 25th, 2015|News & Events|Comments Off on SMB Awareness of Breach Notification Laws IndustryView | 2015

Defending Big Data: An SC Magazine ebook

by Stephen Lawton, editor, November 17, 2014 – Click here to download the entire ebook. (Following is an excerpt from SC magazine.)

Additional layers of identity credential access management could identify and stop a potential breach. Some enterprises, such as the NSA, are finding that migrating to the cloud aids in the […]

By |November 17th, 2014|News & Events|Comments Off on Defending Big Data: An SC Magazine ebook

Keeping Your Business Data Safe from Holiday Hackers

by Nicole Fallon, Business News Daily Assistant Editor   |   November 13, 2014 

In the wake of the recent string of corporate data breaches, businesses are more alert than ever about cybersecurity. Right now, many of them are also gearing up for the busy holiday shopping season, which brings more opportunities for hackers […]

By |November 13th, 2014|News & Events, PCI Compliance|Comments Off on Keeping Your Business Data Safe from Holiday Hackers
  • Permalink Gallery

    27 Data Security Experts Reveal The #1 Information Security Issue Most Companies Face With Cloud Computing & Storage

27 Data Security Experts Reveal The #1 Information Security Issue Most Companies Face With Cloud Computing & Storage

Digital Guardian, November 12, 2014

”What is the number one issue most companies face with cloud computing and data security, and what can they do to address the issue?”

Cloud computing is quickly becoming a mainstay for many technology companies today because of its superior flexibility, accessibility, and capacity compared to traditional online computing and storage methods. […]

By |November 12th, 2014|ISO 27002, News & Events, Uncategorized|Comments Off on 27 Data Security Experts Reveal The #1 Information Security Issue Most Companies Face With Cloud Computing & Storage

How to Prevent Insider Threats

Samuel Greengard, contributing writer for CIO Insight, October 15, 2014

Insider threats aren’t going away anytime soon. Unfortunately, most businesses say they lack the ability to detect or deter them, nor are they adequately prepared for how to respond.

Over the last few years, especially in the wake of former contractor Edward Snowden’s disclosures about the National Security […]

By |October 17th, 2014|ISO 27002, News & Events, Penetration Testing|Comments Off on How to Prevent Insider Threats