1.800.219.7290 / Careers / About Us / Contact Us / Partner Login / Shop Online

Categories

Popular Tags

Archives

Our Authors

Subscribe

Posted by on in Compliance
Healthcare organizations are frequently victimized by data breaches. Cybercriminals target this sector due to the type of information on record - information such as names, addresses, Social Security numbers can be the starting point for a credit card fraud scheme. A recent presentation from consult...
Hits: 460
0

Posted by on in Data Breach
With data entering and exiting organizations from every angle, it can be difficult to pinpoint where the data security risks lie. Fortunately, a recent MeriTalk survey of government IT managers outlined the most frequent sources of data loss. What may be surprising is that trends like bring-your-own...
Hits: 675
0
The issue of security inevitably crops up with any cloud migration. Even companies that don't deal with highly sensitive customer data or confidential security reports usually have something they would like to protect. Recent research has suggested that the cloud has become more technologically secu...
Hits: 347
0
Hackers have turned to automation as a way to efficiently orchestrate attacks against a large number of targets. Combined with increasingly sophisticated malware, organizations have reason to be a little concerned about the effectiveness of their traditional, perimeter-based defenses such as firewal...
Hits: 1093
0
The information security landscape becomes increasingly complex, making it difficult for many organizations to navigate the solutions available and how to optimally implement them. In addition to the ability to encrypt data, businesses must also contend with the cost of the software and the actual i...
Hits: 222
0