Should I Join the Cloud Security Alliance?
Staying on top of the latest threats to cloud networking is difficult. Many IT professionals turn to professional organizations like the Cloud Security Alliance, bloggers, and other sources for...
View ArticleCloud Computing 101: Verifying Security in the Cloud
Salesforce, Google Apps, and Microsoft Office 365 are all examples of "Software as a Service" (commonly called SaaS), which are cloud-based programs that businesses use for any number of functions,...
View Article2013 Year-end Highlights: 5 Major Trends in Data Breaches and IT Liability
Between the Edward Snowden saga and the botched Obamacare rollout, 2013 was a year filled with concerns about data security and tech liabilities. Think about it: two of the biggest stories of the year...
View ArticleSpoiler Alert: Downton Abbey Data Breach Shows the Problem with Security...
Notorious hacker Guccifer committed a cyber crime sure to bother loyal fans of the PBS period drama Downton Abbey: he hacked a screenwriter's email account, stole the script for the series finale, and...
View ArticleWhat the Reintroduction of the Data Privacy Act Means for Small Businesses
As an IT professional, developer, or consultant, you've probably heard rumblings about a bill called The Data Privacy Act. The bill will increase data security standards and strengthen punishments for...
View Article5 Steps to Protect Your Business from 2014’s Biggest Data Security Threats
Though we're only in the early stages of 2014, data security experts have already identified a number of growing threats and new trends in cyber security.As an IT professional, you know that new...
View ArticleBlack to the Future: Better Security from the Next Class of Smart Phones?
In recent days, we've seen a slew of new mobile devices and apps designed to prevent data breaches. Last week's RSA conference in San Francisco provided developers, engineers, and tech companies a...
View ArticleMake Your Clients Safer: A Lesson in Email
According to a PressTV report, a recent study by HALOCK Security Labs revealed that email security problems are surprisingly common in the financial industry. More than 70 percent of mortgage lenders...
View ArticleHelp Your Clients Understand the Risks from Third-Party Contractors
Your clients might use third-party vendors to outsource their payroll, HR, IT infrastructure, and all sorts of essential small-business functions. Unfortunately, as Business News Daily reports, this...
View ArticleDoes the Bitcoin Model Offer the Future of Technology Insurance?
Since Mt. Gox, Poloniex, and other Bitcoin exchanges (and mobile software) were hacked, developers have increasing concerns about digital security and data breach lawsuits. Bitcoins can be a polarizing...
View ArticleWhat IT Businesses Need to Know about the Future of Identity Theft, Data...
While you might assume that the Target data breach was caused by a coordinated and sophisticated malware attack, the truth is much more frightening.SecurityWeek.com profiles MacAfee's investigation of...
View ArticleClients Getting New Gadgets? Help Them Make Smart Choices
The SCORE Small Business Success blog recently predicted that we'd see more and more small businesses looking to upgrade their technology and improve their IT infrastructure. That's good news for IT...
View ArticleDoes the Bitcoin Model Offer the Future of Technology Insurance?
Since Mt. Gox, Poloniex, and other Bitcoin exchanges (and mobile software) were hacked, developers have increasing concerns about digital security and data breach lawsuits. Bitcoins can be a polarizing...
View ArticleGmail Just Got Safer (But You Could Still Be Sued)
According to the corporate law magazine InsideCouncil, Google has increased its Gmail security standards in order to ease customer concern and provide a more secure email platform to companies that...
View ArticleYour Clients Want Mobile Payments? Here’s What to Tell Them
What do fast food companies Wendy's and Burger King and the fashion store Express all have in common? They've recently announced they will be accepting mobile payments.This is part of growing trend to...
View ArticleCloud Computing 101: Verifying Security in the Cloud
Salesforce, Google Apps, and Microsoft Office 365 are all examples of "Software as a Service" (commonly called SaaS), which are cloud-based programs that businesses use for any number of functions,...
View ArticleWhat IT Businesses Need to Know about the Future of Identity Theft, Data...
While you might assume that the Target data breach was caused by a coordinated and sophisticated malware attack, the truth is much more frightening.SecurityWeek.com profiles MacAfee's investigation of...
View ArticleClients Getting New Gadgets? Help Them Make Smart Choices
The SCORE Small Business Success blog recently predicted that we'd see more and more small businesses looking to upgrade their technology and improve their IT infrastructure. That's good news for IT...
View ArticleDoes the Bitcoin Model Offer the Future of Technology Insurance?
Since Mt. Gox, Poloniex, and other Bitcoin exchanges (and mobile software) were hacked, developers have increasing concerns about digital security and data breach lawsuits. Bitcoins can be a polarizing...
View ArticleGmail Just Got Safer (But You Could Still Be Sued)
According to the corporate law magazine InsideCouncil, Google has increased its Gmail security standards in order to ease customer concern and provide a more secure email platform to companies that...
View Article