If you’ve spent any significant amount of time around technology, or even just poked around on the Internet, you’ve probably already been introduced to the concept of two-factor authentication (a.k.a multi-factor authentication), without realizing...
Two-Factor Authentication: What Is It and Why Do You Need It?
Extreme Makeover: Network Security Edition
The appeal of makeover and home renovation shows is no doubt the Cinderella transformation that seems to happen overnight to deserving people and places. Where security transformation is concerned, though, the process is rarely an overnight miracle....
Phishing Litmus Test - Do your employees know how to recognize this common e-mail scam?
We have written at length about the Human Firewall and how it can either be your business’ greatest defense or largest liability. So much of the human firewall’s strength depends upon how well employees are trained and empowered to respond to...
If This Happens, Then What? How We Talk with our Clients about Business Continuity
The Business Continuity Institute is kicking off its annual Business Continuity Awareness Week (BCAW) this week, from May 14-18, which aims to help organizations and professionals address emergency preparedness. For this reason, we want to give you...
Is It Time For a Data Security Checkup?
If your company is debating whether to adopt a public cloud or to develop a private computing setup, security is undoubtedly a key driver in your decision making. The appeal of a public cloud is the advanced security tools that even large companies...