How to Protect your Mobile Device20130430140640
How to Protect your Mobile Device
April 30, 2013
We are all reliant on our smart phones. Whether your focus is on pleasure or business, it’s safe to say that your mobile...
How to Create a Corporate Culture Focused on Security20130423151714
How to Create a Corporate Culture Focused on Security
April 23, 2013
Corporate culture is important. Employees want to work for a company that shares their same beliefs and values, and has ...
How to Prevent Internal Data Leaks20130411120744
How to Prevent Internal Data Leaks
April 11, 2013
No employer wants to believe that a member of their staff would voluntarily compromise confidential information. Unfortu...
7 Things to Include in your BYOD Policy20130403123419
7 Things to Include in your BYOD Policy
April 3, 2013
Yesterday we shared a post on whether or not Bring Your Own Device (BYOD) policies are required in the workplace. While ...
Does my Organization need a BYOD Policy?20130402151728
Does my Organization need a BYOD Policy?
April 2, 2013
Bring your own device (BYOD) continues to be a topic that generates much discussion in the security space. Discussions o...
What is the Difference Between HTTP and HTTPS?20130322103657
What is the Difference Between HTTP and HTTPS?
March 22, 2013
Before jumping into HTTPS, let’s first discuss what the acronym HTTP stands for. HTTP, HyperText Transfer Protocol, is a...
How to Successfully Manage BYOD Security20130321105650
How to Successfully Manage BYOD Security
March 21, 2013
We’ve talked about Bring Your own Device (BYOD) on the blog before, and it’s still a topic that’s generating a lot of co...
Protecting Your Company After an Employee Leaves20130315131127
Protecting Your Company After an Employee Leaves
March 15, 2013
When an employee leaves a company, especially on bad terms, there’s always a risk that they could try to negativel...
What if your Security is Breached? 3 Lessons Learned20130228123319
What if your Security is Breached? 3 Lessons Learned
February 28, 2013
You had backups to your backups, plans in place, and security that you had faith in. But it still happened. Your systems...