The True Cost of Data Breaches for Financial Organizations

By |2018-05-28T00:39:28+00:00September 5th, 2017|Categories: Security, Tech News, Uncategorized|

Threats to compliance are growing at an alarming rate with the number of security breaches that have occurred in recent months. Financial institutions understand the importance of security and regulatory compliance, but when they find themselves unable to protect sensitive data based on best practices, you have to wonder about the real cost of a data [...]

Ransomware in the Legal Industry – How to Protect your Firm

By |2018-05-01T01:49:33+00:00June 24th, 2017|Categories: Compliance, Ransomware, Security, Technology|

Ransomware attacks are on the rise, grabbing headlines on a global stage. In April 2016, the Federal Bureau of Investigation warned that cyber criminals have already extorted $209 million from companies in just three months. This statistic showed that ransomware was on track to become a billion-dollar crime by the end of last year, but that’s [...]

Managing a Myriad of Mobile Devices

By |2018-05-01T01:51:41+00:00June 20th, 2017|Categories: Mobile, Security, Technology|

The lines between various mobile devices are blurring. As real world applicable mobile technology has just taken flight, many enterprises host a myriad of different platforms. A policy that supports all platforms is a must, especially for companies with non sequitur hardware. This can help you cut down on infrastructure cost and improve operational efficiency. The [...]

The Best Security For Mobile Devices

By |2018-05-01T01:48:13+00:00June 19th, 2017|Categories: Security, Technology|

Many enterprises are now embracing mobile devices such as cell phones and tablets. The rapid adoption of these devices has enabled greater mobility to the workforce. However, it has brought up a myriad of security concerns that need to be addressed in practice and policy. The degree you can control security on the mobile devices used by [...]

Your Data In The Cloud – The Good and The Bad

By |2018-05-01T01:35:28+00:00June 18th, 2017|Categories: Cloud, Compliance, Monitoring, Security, Technology|

An October 10, 2011 Network World article titled “Beware of the iCloud” described an enterprise nightmare scenario around Apple’s newly introduced cloud storage service: “You’re at your office Mac, working on a sensitive company document.  There’s a copy of the document automatically pushed to your iPad, which a family member borrowed and took to Starbucks.  There’s [...]