Data Encryption Part 2: What Should Your Company Encrypt?

If you’ve been following our recent data encryption series, you know that protecting against cyber attacks is incredibly important. In our last post, we went over exactly what data encryption is, the types of data encryption methods, and how data encryption benefits organizations of all kinds. Next, it’s important to understand the type of data […]

Defending Against Insider Threats (Part 2)

Insider Threats can cripple an organization, but a multi-layered security strategy can reduce the likelihood of success. Some of the best practices for guarding against insider threats also apply a range of security issues. When developing your overall security plan, it is important to prioritize implementation as well as establish a ranking of most critical […]

Defending Against Insider Threats (Part 1)

In their “Common Sense Guide to Mitigating Insider Threats 4th Edition,” CERT provides an exhaustive set of recommendations for defending against insider threats. This raises the question, “Can a company actually defend against insider threats?” Insider threats can be stopped, but it will require a layered approach throughout the company. Like many security issues companies […]

10 Smart Government IT Trends

In a recent symposium on smart government, Gartner Research analysts suggested that social, mobile, cloud and information are converging and driving innovation that will help establish and develop smart governments. Gartner offers 10 related IT trends that will play a key role in the coming years (see Gartner Newsroom). What is smart government? It might […]

Steps toward BYOD Defense

As Hospitals and Medical Facilities extend wireless access, it is essential to develop a robust BYOD defense plan. The public nature of hospitals and the large traffic of visitors, professionals and staff increases the risk of exposing data, violating patient privacy, and malicious attacks. The recent attacks at Target and Neiman Marcus expose the sophisticated […]