Businesses face many information security risks that must be balanced with the need for information to flow, enabling business productivity. Between mobile devices, remote data centers and cloud-based applications, there’s no longer a well-defined security perimeter. Instead of fixed devices and endpoints, there’s a constant state of flux.… Read More
Mobile data breaches are far more common than many of us may think. In fact, a recent study by the Ponemon Institute showed that a whopping 67% of organizations were “certain or likely that their organization had a data breach as a result of employees using their mobile devices to access the company’s sensitive and confidential information.” Wow!… Read More
When deciding which antivirus software is right for you, you have a wealth of options. First, you need to decide what you’re trying to defend: servers, desktops, mobile devices? For a small- or medium-sized business, antivirus is not just a matter of downloading and installing an application on your computer – you need a strategy.… Read More
The average user has a ton of username/password combinations floating out in cyberspace. Combine that with passwords used within a small or medium sized business and soon the passwords are overflowing, quick to be forgotten or even worse, ready to fall into the hands of hackers.… Read More
Whether your company provides phones to staff or supports a Bring Your Own Device (BYOD) policy there are risks associated with phones that access your company’s data. Let’s look at some of the key points surrounding phones in the workplace.
Far too many end users simply do not configure the security settings on their devices.… Read More