More and more cyber criminals have shifted their focus in hopes of preying on the weakest link in the security chain: the end users. Instead of seeking to compromise servers…
Risk Management experts suggest that 70% of an organization’s value is tied to their brand and reputation. Plenty of things can damage your company’s reputation; social media indiscretion, nasty [...]
Everyone in our industry knew this one was coming. According to reports, “a stolen password was used to access an employee Dropbox account containing a project document with user email [...]
Again. I can’t get over the lack of a keyboard. After 10 years of typing on a BlackBerry, I was fast. With the iPhone, after 2 weeks, I’ve just moved from pathetic to poor. …
In the grand scheme of your business, computer security is essentially worthless. What really matters is the security of your information. Devices are easily replaced – your confidential [...]