How to Protect your Mobile Device20130430140640

How to Protect your Mobile Device

April 30, 2013
We are all reliant on our smart phones. Whether your focus is on pleasure or business, it’s safe to say that your mobile...
How to Create a Corporate Culture Focused on Security20130423151714

How to Create a Corporate Culture Focused on Security

April 23, 2013
Corporate culture is important. Employees want to work for a company that shares their same beliefs and values, and has ...
How to Prevent Internal Data Leaks20130411120744

How to Prevent Internal Data Leaks

April 11, 2013
No employer wants to believe that a member of their staff would voluntarily compromise confidential information. Unfortu...
7 Things to Include in your BYOD Policy20130403123419

7 Things to Include in your BYOD Policy

April 3, 2013
Yesterday we shared a post on whether or not Bring Your Own Device (BYOD) policies are required in the workplace. While ...
Does my Organization need a BYOD Policy?20130402151728

Does my Organization need a BYOD Policy?

April 2, 2013
Bring your own device (BYOD) continues to be a topic that generates much discussion in the security space. Discussions o...
What is the Difference Between HTTP and HTTPS?20130322103657

What is the Difference Between HTTP and HTTPS?

March 22, 2013
Before jumping into HTTPS, let’s first discuss what the acronym HTTP stands for. HTTP, HyperText Transfer Protocol, is a...
How to Successfully Manage BYOD Security20130321105650

How to Successfully Manage BYOD Security

March 21, 2013
We’ve talked about Bring Your own Device (BYOD) on the blog before, and it’s still a topic that’s generating a lot of co...
Protecting Your Company After an Employee Leaves20130315131127

Protecting Your Company After an Employee Leaves

March 15, 2013
When an employee leaves a company, especially on bad terms, there’s always a risk that they could try to negativel...
What if your Security is Breached? 3 Lessons Learned20130228123319

What if your Security is Breached? 3 Lessons Learned

February 28, 2013
You had backups to your backups, plans in place, and security that you had faith in. But it still happened. Your systems...