Ten tips for securing mobile devices
Every day, more and more people use portable devices such as laptops, tablets, and smart phones for things they might have previously chosen to do on a desktop computer. These …
Read MoreSecurity For All
Every day, more and more people use portable devices such as laptops, tablets, and smart phones for things they might have previously chosen to do on a desktop computer. These …
Read MorePlacing a value on loss caused by a cyber incident can sometimes be very difficult. Placing a value on a loss that never happens can be even more difficult. Though, …
Read MoreThe use of computers in the workplace is almost essential in today’s business. They enable people to accomplish a great deal of work rapidly, communicate easily, and collaborate of projects …
Read MoreYou have a thriving business that you are proud of. Maybe you have found the secret formula to serve up a product or service and make the most of a …
Read MorePlanning for a disaster shouldn’t be a foreign concept to most people. Many people put away funds for an emergency, buy insurance to repair or replace damaged property or help pay for medical …
Read MoreYou know the drill. Your computer prompts you that there are software updates pending, but it just isn’t a convenient time. Maybe you’re in the middle of paying bills. Maybe …
Read MoreThe National Institute of Standards and Technology, also known in the field of security as NIST, is well known for setting industry standards. Part of the U.S. Department of Commerce, …
Read MoreSocial media has become something everybody uses in at least one form or another. Twitter, LinkedIn, Facebook, and many others are used by several million people every day, often several …
Read MoreShadow IT, a term that just sounds insidious. Surely it is something that governments use as a tool for state-sponsored cyber wars, right? The term suggests hidden technologies, lurking in the background. …
Read More(Post 12 of the 12-week Information Security Management blog series) Information security is unlike other information technology disciplines. Most others require the professional to be proficient and knowledgeable in their area of …
Read More