IT Defense in Depth Part II
In our last blog, we started talking about the different layers of security necessary to fully defend your data and business integrity. Today we will[...]
You’re Fired! Now Give Me Your Password
“You’re FIRED!” ( now give me your password) Losing an employee is not usually a good experience. If they leave voluntarily, you lose a valuable[...]
Password Basics That Are Still Ignored
You can have all the locks on your data center and have all the network security available, but nothing will keep your data safe if[...]
What The Cloud Means For You – Part II
Recently, we talked about ways the cloud brings value, business protection, and economies of scale to the smaller firm that they could never achieve by[...]
Security And Your Subcontractors
Security And Your Subcontractors So you feel relatively comfortable that you have created cyber security around your data and your employees are trained to avoid[...]
NPOs And Your Volunteer Security Nightmare
Not-for-profits have an unusual issue regarding security. Firms that have trained, paid full-time employees have a strong level of control over the actions of their[...]
Human Error Causes So Much Trouble
Have you been focusing on software packages and anti-virus tools to protect your data from hacking? That may not be enough, because it overlooks one[...]
Higher Goals and Technology: The NPO Story
If you are a smaller NPO, Not-for-Profit, it is likely that your organization has been driven from its inception by individuals strongly motivated with a[...]
Government Regulations
Any business that stores customer payment information must comply with a number of state and federal regulations. The legal, healthcare, and financial sectors have a[...]