Organizations have seen great success when a large part of their employee base also acts as social media contributors. Join us for a webinar on March 31th at 12pm ET.  Click here to register.

security

March 25, 2015
​Imagine that tomorrow you wake up to find out a virus has infected your laptop and all your files have vanished. Your family photos, your spreadsheet of online passwords (a major security faux pas) and that report you need for a meeting later today — all gone.
Laptop Security
March 18, 2015
By January 31, the due date for W2s and other tax forms to be postmarked, accountant and tax preparer offices were already bustling with extra traffic. Employees at a tax office just outside Baltimore, MD noted the speed clients exhibited this year in scheduling appointments. Several clients...
March 18, 2015
You may have come across advertisements for VPNs, and may even know what it stands for ( Virtual Private Network ), but if you are like most people, you aren’t sure what VPN does, or why it is important for your business. A VPN can serve many purposes; a VPN allows you to stream Netflix, Hulu, and...
March 18, 2015
When you consider the extraordinary rate at which identity crimes occur — impacting consumers every two seconds according to Javelin Strategy and Research — such a high degree of fear seems logical. Identity crimes also threaten a consumers’ sense of control, a need so vital that people are forever seeking ways to gain it in all aspects of their lives.
March 17, 2015
2014 was “The Year of the Breach.” 2015 continues to bring to the public spotlight data breaches cases that should make any business reflect on its own information security plan, and become more cautious with respect to their data, employees and business practices.
2014 data breaches in the united states infographic thumb
March 14, 2015
Keeping a business protected is more important now than ever. With recent hacks coming to light such as the SONY and Anthem Blue Shield attacks that compromised hundreds of thousands of customer personal information, it makes sense to protect your business when it begins to use social media for branding and promotional campaigns so that you business and customers don't fall victim to similar crimes.
March 12, 2015
In recent weeks, technology researchers have discovered a decade-old security flaw, dubbed “FREAK,” that leaves Apple and Google devices and Microsoft Windows PCs vulnerable to hacking.
FREAK
March 11, 2015
An organization’s privacy policy may state that your anonymized data may be shared with third parties. The mistake we tend to make is that we assume that since our data is anonymized, our identities can’t be revealed. But that’s not always the case.
March 05, 2015
Private data is now a very public issue. For the first time in history, people recognize that businesses store their information and they want to know how – and why. They want to know why websites need their email address so badly, and they understand that private photos can be hacked.
customer data
March 03, 2015
Uber is providing impacted drivers with one year of f ree credit monitoring services and will be filing a “John Doe” lawsuit so they can more effectively gather breach-related information in order to determine the responsible third-party.

Pages