Spreadsheets are flexible, inexpensive and easy to use. They are [...]
We came across a post on Docurated that pulled together [...]
When DuPont lost $400 million in intellectual property, it wasn?t [...]
Most of the regulatory compliance issues we talked about concerning [...]
Today's malware are designed to generate revenues for their creators. That's a very compelling driving force for would-be cyber crooks, don't you think? So how can you still sleep well at night?
External and internal threats to sensitive data can be mitigated by using effective authentication and access controls
Sometimes, all it takes is keeping the cyber crooks out.
So you had a customer data security breach last weekend? Do you know you could be held liable in court for failing to implement required security procedures?
iPhones, BlackBerries, Androids. Extensive use of mobile devices in business-related activities may introduce additional vulnerabilities to your system.
Even in an economic downturn, threats to IT security can still be on a rise.