Information Security Summit 2017 Recap: Ransomware, Application Security, Unstructured Data and the Cloud

By Michelle Drolet . 28 Jun 2017

  Thanks to all who attended and sponsored our 2017 Information Security Summit. It was a great turnout where we discussed a number of issues and threats facing InfoSec today. We were happy to see attendees share ideas and continue the discussion online with #summitbuzz17 Here are some of the topics discussed at this year’s … Continue reading Information Security Summit 2017 Recap: Ransomware, Application Security, Unstructured Data and the Cloud

7 Steps to Proactive Security

By Michelle Drolet . 4 Nov 2016

The key to securing against this threat lies in a common metaphor—if a ship has a hole, it is better to patch the breach than bail the water   Data breaches are increasingly becoming an expensive problem for more and more companies. According to the most recent Ponemon Institute Data Breach report, insecure data cost … Continue reading 7 Steps to Proactive Security

Information Security Summit 2016 Review: Ransomware, Application Vulnerability, Hacking as an Industry Lead our Discussion

By Michelle Drolet . 23 Jun 2016

Thanks to all who attended and sponsored our 2016 Information Security Summit. It was a great turnout where we discussed a number of issues and threats facing infosec today. We were happy to see attendees share ideas and continue the discussion online with #summitbuzz16 Here are some of the topics discussed at this year’s summit: … Continue reading Information Security Summit 2016 Review: Ransomware, Application Vulnerability, Hacking as an Industry Lead our Discussion

8 Tips to Secure Those IoT Devices

By Michelle Drolet . 20 Jun 2016

Make sure the Internet of Things isn’t a route for hackers to get into your home or workplace   As more and more Internet-connected devices find their way into our homes and businesses, it’s important to remember that they represent a security risk. The Internet of Things (IoT) is growing rapidly, and in the rush … Continue reading 8 Tips to Secure Those IoT Devices

7 Potential Security Concerns for Wearables

By Michelle Drolet . 28 Apr 2016

Is your organization safe from all these connected devices? Wearables are rapidly invading the workplace in much the same way that smartphones did. Fitness trackers, smartwatches, head-mounted displays and other new form factors are beginning to capture the public imagination. Sales of wearable electronic devices topped 232 million in 2015, and Gartner forecasts they’ll rise … Continue reading 7 Potential Security Concerns for Wearables

Are Mobile Apps Putting Your Data at Risk?

By Michelle Drolet . 24 Mar 2015

Frequently, companies don’t realize that the mobile apps they use are reason for concern. Once their data is breached, they begin to investigate. However, there are telltale signs that indicate an insecure mobile app. If you know what to look for, you may be able to avoid a catastrophic data breach. Mobile apps are everywhere … Continue reading Are Mobile Apps Putting Your Data at Risk?

More Devices, More Problems.

By Michelle Drolet . 6 Oct 2014

Check out this infographic for the numbers behind BYOD.

Four Steps to Respond & Recover from Sophisticated Security Attacks

By Michelle Drolet . 29 Jul 2013

Great information in SC Magazine’s latest whitepaper report, ‘Four steps to respond and recover from sophisticated security attacks’, it discusses the four proactive steps that you can – and should – take now to help keep your organization safe. Click here to view more details: http://bit.ly/131uu2J As we all know, cyber-attacks are becoming more sophisticated … Continue reading Four Steps to Respond & Recover from Sophisticated Security Attacks

Views from the Inside: A successful BYOD policy is not just about security

By Michelle Drolet . 30 Apr 2013

The BYOD trend shows no sign of abating as more and more organizations recognize the potential benefits in terms of cost and convenience. According to a recent surveyby Good Technology, 76 percent of enterprises are now supporting BYOD and the majority of those that still don’t are planning to do so in the near future. When … Continue reading Views from the Inside: A successful BYOD policy is not just about security

BYOD Brings on a War of Worry

By Michelle Drolet . 28 Jan 2013

It appears that BYOD, “Bring Your Own Device” to work, is beyond just being a growing trend if not currently a sanctioned practice within the corporate walls. It may seem that bowing to this desire on the parts of employees would have a lot to offer, not the least of which is a reduction in … Continue reading BYOD Brings on a War of Worry

Tags