View Post

Security Heightens as Hackers Target Mobile

In Mobility, Security by Daniel NewmanLeave a Comment

Many enterprises have taken to creating their own proprietary apps and software, and mobile devices are now a mainstay in modern business. Shadow IT isn’t the only concern accompanying the growth of mobile in the business world, however. As mobile technology becomes more popular and pervasive, hackers are turning their attention toward mobile devices. Understand Shadow IT in Modern Business …

View Post

The Hard Line Between Disaster Recovery Planning and Experience

In Security by Daniel NewmanLeave a Comment

Balancing proactive and reactive business approaches is tricky. If you wait too long to address a risk, your business could suffer a major blow, but investing in a what-if scenario costs time and money that may not be the best investment—unless you consider peace-of-mind about your company’s future a sound financial investment. Too many times, companies who fail to invest …

View Post

Security Is a Must, But Is It Costing Productivity?

In Security by Daniel NewmanLeave a Comment

In past posts, I’ve discussed how important it is for companies to focus on their IT security strategy. When strategy becomes too rigid, however, employees pay the price. Accessibility issues create extra work for the help desk, slowing a company’s productivity. How do you balance security and productivity? The two don’t have to work against each other. You can protect …

View Post

Sharing: The #1 Reason Your Company Security Will Be Breached

In Security by Shelly KramerLeave a Comment

Many companies are headed to the cloud these days looking for new and better ways to collaborate, store, and share information. Is yours? Whether you’re going the public, private, or hybrid route, moving to the cloud is a very popular decision—in fact, you’ll find 93 percent of companies share your strategy. Of course you didn’t adopt cloud because you wanted …

View Post

Cybersecurity Risks and the Healthcare System [Report]

In Security by Shelly KramerLeave a Comment

When you think about online security, it’s a fair bet that the protection of your health records will be near the top of the list of the personal data that you value the most. Well, surprise: According to a new benchmark report, your personal health information would appear to be less well protected than you might imagine. The Insights Industry …

View Post

Dell Report Reveals Iranian Hackers Used LinkedIn to Spy

In Security by Shelly KramerLeave a Comment

How often have you gotten a social media connection request from a person you didn’t know well, or perhaps even at all? Did you reject it immediately, accept, or do a little research first? Many people skim the profiles of potential connections to determine the validity of an unknown request—that is, the perceived validity. What if those seemingly random requesters …

Is The C-Suite Guilty of Ignoring IT Security and its Associated Risks?

In Security by Daniel NewmanLeave a Comment

Last year, Target’s CEO stepped down after one of the worst cyber-attacks we’ve seen yet. In the massive data breach, debit and credit card details of a staggering 100-plus million customers were stolen. Unfortunately, Target is not alone. More than 90 percent of Fortune 500 companies have been victims of cybercrimes, and cases of security leaks and hacks hit the …

10 questions to ask to ensure your cloud services provider is HIPAA compliant

In Security by Shelly Kramer1 Comment

More companies are looking to the cloud for business and data storage solutions, especially those in the healthcare space. If your business must be HIPAA compliant, these 10 questions to ensure HIPAA compliance might save you some major headaches down the road. HIPAA, the Health Insurance Portability and Accountability Act, is one way that security and privacy is regulated. It was …

View Post

Five IT Security Claims You Can Quit Believing

In Security by Shelly KramerLeave a Comment

According to the latest annual PwC survey of the Global State of Information Security, the number of cyber security incidents detected is rising sharply, while the amount spent on security has been falling. Given the extremely high cost of a cyberattack to a businesses’ reputation and day-to-day operations, it’s a bit of an understatement to say this might be considered …