1.800.219.7290 / Careers / About Us / Contact Us / Partner Login / Shop Online

Categories

Popular Tags

Archives

Our Authors

Subscribe

It's probably not too surprising these days to see Angry Birds right alongside a customer relationship management application. For the most part, it's acceptable to let employees enjoy a few physics puzzles over lunch. However, many mobile apps pose more of a risk to user privacy than they advertise...
Hits: 421
0
A doctor uses his iPhone to send a medical image to his colleague. A sales representative pulls up a purchasing history on her laptop as she talks with a customer. A data scientist inputs sales numbers, company budget information and customer demographics into an analytics program. They all have a f...
Hits: 352
0
Your data might be under attack. Right now. "Surely not," you say? Think again. For organizations that use in-house data centers and IT services, the task of protecting sensitive data can be hindered by the difficulty of detecting a breach. According to a recent article in InformationWeek, most bus...
Hits: 335
0
Cloud computing and mobile technology have allowed employees to move out of the traditional office and access critical data from anywhere. However, those technologies have also created an evolution of the threat landscape because data is no longer locked down in an unconnected data center. With sign...
Hits: 682
0

Posted by on in Compliance
Technology professionals often have to come face-to-face with the reality that it may be impossible to establish a 100 percent secure system. Even with the best firewalls and antivirus solutions in place, weaknesses can emerge from improper configuration or out-of-date software versions. However, wh...
Hits: 583
0