How do IT leaders manage encryption the smartest way?

Today’s IT leaders have to ensure that desktops, laptops, and tablets  are secure, which is not any easy feat when they all run on different operating systems – and that is just the beginning. As most organizations move to the cloud, there is a new set of security considerations to tackle. An organization needs to ensure that every confidential piece of data is protected no matter where it resides.

The 5 Best ‘Tis the Season Security Posts

‘Tis the season to be jolly! We wanted to share the 5 best seasonal posts about security to help everyone stay safe because this is, unfortunately, also the season where Cyber criminals take advantage of unsuspecting people. So let’s make data protection a priority, and end this year on a high note.

5 of the Best Cybersecurity Tips for Retailers this Black Friday and Cyber Monday

Today is Black Friday. Many retail stores in North American have customers lining up outside for hours to get the best deals. In 2015, 74.2 million people shopped on this day for your great deals! And around 30% of annual retail sales happen during the Black Friday through Boxing Day season, according to the National Retail Federation. With all this excitement of dropping prices and advertising to invite consumers to your stores, you are also potentially inviting cyber criminals that have been waiting for an opportunity to get information on your consumer data. 

Tips for Retailers to Keep Your Data Secure This Black Friday

According to Wikipedia, “in 2014, $50.9 billion was spent during the 4-day Black Friday weekend”. People are eager to jump on the great Black Friday and Cyber Monday deals! What else comes with these amazing sales? Thieves and cybercriminals! They prey on the uninformed organizations that keep their guard down, ready to steal your customer’s credit card information!

Keeping your Data Safe in the World of Cloud

We live in a world where cloud storage is becoming a part of our everyday life. We use it at home, at work, even on the go. People are able to share files, pictures, and videos within a few clicks of a button and we can access this information from anywhere, as long as there is internet access.

Educating with Data Security

Education institutions have numerous important and sensitive documents stored that they are responsible for. This sensitive information belongs to students, parents and faculty and comes in the form of loans, financial records, employment records, etc.

Maturity Model

As the environment and industry becomes increasingly data driven, data encryption and data security become top of mind among most IT administrators.  

Kill Switch the Game Changer

Have you heard of Apple’s “Kill Switch”? If not, then you might want to look into it. This feature is the new theft deterrent system that will allow the owner of the device to remotely lock it and wipe it clean if ever lost or stolen. If I might say so myself… it’s about time!

Dangers of Public Wi-Fi

How often do you find yourself using public Wi-Fi? It seems like the perfect little treat while enjoying a hot beverage at a coffee shop. A coffee with a side of free Wi-Fi, why yes please!

Stay Safe While Travelling

Travelling can be a huge hassle with going through customs, checking in luggage, and trying to make your connecting flights. With all of this going on, we tend to forget that there can be unique security challenges as well.

Data Breach Law

A new American law that would create a protocol of how a data breach is handled may be soon in play.. President Barrack Obama called for a federal legislation on Monday, January 12th that would standardize how a data breach is handled by all American organizations.