Recent Posts

Your Employees Are Your Biggest Security Threat

Rick Delgado
The first step to avoiding major problems is to know what the problems may be. This is not always easy, but asking questions could help you avoid the most common mistakes. More companies are becoming aware of the role they have in educating their employees in the BYOD program.
Your Employees Are Your Biggest Security Threat

Risk Management: Protecting Your Brand on Social Media

jessullrich
Businesses that succeed at social media marketing are able to create unofficial brand ambassadors that are genuinely excited about their products and services and willing to share them with family and friends. But there are also several obvious risks for brands using social media to connect with customers. From illegitimate pages and pornographic avatars to brand attacks of a political nature, companies are often faced with a number of challenges.
Risk Management: Protecting Your Brand on Social Media

Managing the Masses: How One Major Social Network Keeps Things Safe for Its Members

jessullrich
Imagine for a moment that your website received billions of comments, photo and video submissions daily. While you might initially be excited about this level of engagement from your community, most site owners would quickly become overwhelmed by managing the massive influx of user generated content.
Managing the Masses: How One Major Social Network Keeps Things Safe for Its Members

Big Data Privacy Is About You, Me, Them, and Us

TamaraDull
Today, we live in an always-on digital world. We work online. We socialize online. We shop online. We bank online. We support causes online. We are living in a big data world. Who are you entrusting with your data, your personal information? And who’s trusting you (and your company or agency) with their data? Can you be trusted?
Big Data Privacy Is About You, Me, Them, and Us

Enterprise Networking Vendors Prepare for Disruption

David H Deans
The introduction of open source software platforms and bare-metal systems into the legacy enterprise network realm will eventually disrupt the status-quo for leading vendors that have previously benefited from the lack of unruly innovation. Meanwhile, established vendors can still take advantage of the apparent resistance to change within many traditional IT organizations that depend upon the conservative leadership of cautious CIOs.
Enterprise Networking Vendors Prepare for Disruption

The Keys to Managing and Using Company Passwords

Rick Delgado
Improving your business’s security is certainly not easy, but it’s best to start with what many consider the first line of defense. Passwords can protect your accounts and business data, but only if they’re used effectively. Hackers like an easy target and having difficult-to-crack passwords can persuade them to look elsewhere.
The Keys to Managing and Using Company Passwords

A Cautionary Tale: Are You Clicking Your Privacy (or the Privacy of Others) Away?

TamaraDull
The big data privacy discussion is subtle, complex and complicated – and we each have a role to play. What’s yours going to be? This is my adapted version of the popular "Feathers in the Wind" tale attributed to Rabbi Levi Yitzhak of Berdichev.
A Cautionary Tale: Are You Clicking Your Privacy (or the Privacy of Others) Away?

Whose Story Are You Telling?

TamaraDull
You have limited (if any) control over what others share about you, but you do have control over what you share about yourself and others. Just because you have someone’s personal information doesn’t mean you have to share or act on it. Remember: It may not be your story to tell.
Whose Story Are You Telling?

The Snappening: Over 200,000 Snapchat Photos Leaked Online

larrykim
Hackers leaked 200,000 photos of unwitting Snapchat users to popular websites 4chan and Reddit. Many of the photos are reported to contain nudity of minors.
The Snappening: Over 200,000 Snapchat Photos Leaked Online

The Impact of Wearable Technology on Workplace Security

Rick Delgado
There’s no avoiding the clear trend that will come as the general public adopts wearable technology. The risks that accompany wearable devices are real, but they can be managed by the company willing to prepare for what’s to come. Common sense approaches and the latest security technology can go a long way to ensure a company’s data is protected. Once preparations are complete, businesses can proceed to reap the benefits that wearable technology brings.
The Impact of Wearable Technology on Workplace Security