You don't have to look far to find yet another news story about a company or organization getting breached or hacked in some way. According to the Identity Theft Resource Center, by September 30, 2021 the number of data breaches had already exceeded...
Fundamental Issues with IT Security
Navigating Mobile Device Security
We are fortunate to live at such a time, when so much technology exists to make our lives easier, or more convenient. Unfortunately, we also live at a time when vulnerabilities in these systems is exploited by, and for the benefit of, bad actors....
A Guide to Rule-Based vs. Role-Based Access Control: What are the Differences?
As you know, network and data security are very important aspects of any organization’s overall IT planning. When it comes to implementing policies and procedures, there are a variety of ways to lock down your data, including the use of access...
Keeping Yourself (And Your Company) Safe During Online Shopping Season
Whether you’re gift shopping for friends and family or just taking advantage of the seasonal sales for yourself, it’s quite likely you will make at least one purchase online from November through the end of December. However, all that online...
How Do You Keep Your Devices Secure During The Holidays?
It can be a bit more challenging to keep devices secure around the holidays than at other times in the year for a number of reasons. For starters, your inbox is probably inundated with more emails than usual. Every store is running a sale (or two,...