1.800.219.7290 / Careers / About Us / Contact Us / Partner Login / Shop Online

Categories

Popular Tags

Archives

Our Authors

Subscribe

Recent blog posts

Posted by on in Cloud
At this point, there is no shortage of cloud computing advocates highlighting the technology's commercial potential. But just as cost control and competitive differentiation are leading business priorities, so too is risk management. Most importantly, that means protecting sensitive data as it migra...
Hits: 149
0
Cloud computing has been on the minds of many technology administrators and executives. On the business side, it can make a lot of sense. Outsourcing technology resources allows for agility while combating the rising cost usually associated with implementing new technology. However, not everyone is ...
Tagged in: Cloud
Hits: 129
0
With so many different suspects and strategies capable of breaching data security controls in today's threat climate, companies can easily fall into the trap of overlooking obvious answers. One of the more prevalent - and potentially fatal - mistakes observed by analysts from Quest and Microsoft is ...
Hits: 283
0
It may not be easy to go back and closely look at what went wrong following a data breach. No one wants to be the employee that lost a flash drive or failed to meet a compliance requirement. However, acting within an effective information security framework requires organizations to do exactly that ...
Hits: 190
0

Posted by on in Compliance
Healthcare organizations are frequently victimized by data breaches. Cybercriminals target this sector due to the type of information on record - information such as names, addresses, Social Security numbers can be the starting point for a credit card fraud scheme. A recent presentation from consult...
Hits: 460
0