The Pros and Cons of a BYOD Policy

BYOD, or Bring Your Down Device, is the name of a workplace policy that allows employees to bring their own laptops, tablets, and mobile devices for professional, work-related purposes. This can be advantageous to many businesses as it helps to cut costs on equipment and technology while increasing employee productivity. Although the cost responsibility is […]

Defending Against Insider Threats (Part 2)

Insider Threats can cripple an organization, but a multi-layered security strategy can reduce the likelihood of success. Some of the best practices for guarding against insider threats also apply a range of security issues. When developing your overall security plan, it is important to prioritize implementation as well as establish a ranking of most critical […]

Defending Against Insider Threats (Part 1)

In their “Common Sense Guide to Mitigating Insider Threats 4th Edition,” CERT provides an exhaustive set of recommendations for defending against insider threats. This raises the question, “Can a company actually defend against insider threats?” Insider threats can be stopped, but it will require a layered approach throughout the company. Like many security issues companies […]