How to Create a Corporate Culture Focused on Security20130423151714
How to Create a Corporate Culture Focused on Security
Corporate culture is important. Employees want to work for a company that shares their same beliefs and values, and has a culture they can see themsel...
How to Prevent Internal Data Leaks20130411120744
How to Prevent Internal Data Leaks
Tony Abou-AssalehApril 11, 2013Blue Shield Blue Cross, BYOB, BYOD policy, data leak, secure file sharing, security breach, usb0 comments
No employer wants to believe that a member of their staff would voluntarily compromise confidential information. Unfortunately, internal data breaches...
7 Things to Include in your BYOD Policy20130403123419
7 Things to Include in your BYOD Policy
Tony Abou-AssalehApril 3, 2013bring your own device, BYOD, mobile devices, online security, security policy0 comments
Yesterday we shared a post on whether or not Bring Your Own Device (BYOD) policies are required in the workplace. While BYOD may be a hotly debated to...
Does my Organization need a BYOD Policy?20130402151728
Does my Organization need a BYOD Policy?
Tony Abou-AssalehApril 2, 2013bring your own device, BYOD, Cloud security, mobile security0 comments
Bring your own device (BYOD) continues to be a topic that generates much discussion in the security space. Discussions on mobile security, BYOD and th...
What is the Difference Between HTTP and HTTPS?20130322103657
What is the Difference Between HTTP and HTTPS?
Mark DineenMarch 22, 2013HTTP, HTTPS, Hypertext Transfer Protocol, Secure Sockets Layer, SSL, TLS, Transport Layer Security0 comments
Before jumping into HTTPS, let’s first discuss what the acronym HTTP stands for. HTTP, HyperText Transfer Protocol, is an application protocol for inf...
How to Successfully Manage BYOD Security20130321105650
How to Successfully Manage BYOD Security
Tony Abou-AssalehMarch 21, 2013bring your own device, BYOD, Cloud security, computer world, mobile device0 comments
We’ve talked about Bring Your own Device (BYOD) on the blog before, and it’s still a topic that’s generating a lot of conversation. If managed success...
Protecting Your Company After an Employee Leaves20130315131127
Protecting Your Company After an Employee Leaves
Tony Abou-AssalehMarch 15, 2013**, hack, hacker, internal breach, internal security, IT department, Matthew Keys, password security, two factor authentication0 comments
When an employee leaves a company, especially on bad terms, there’s always a risk that they could try to negatively impact your organization in ...
What if your Security is Breached? 3 Lessons Learned20130228123319
What if your Security is Breached? 3 Lessons Learned
Tony Abou-AssalehFebruary 28, 2013**, data leak, external penetration testing, HRSDC, Human Resources and Skills Development Canada, security breach, sony, wyndham hotels, zappos0 comments
You had backups to your backups, plans in place, and security that you had faith in. But it still happened. Your systems were breached and customer da...
5 Things to Consider When Choosing a Secure File Sharing Provider20130220123828
5 Things to Consider When Choosing a Secure File Sharing Provider
Tony Abou-AssalehFebruary 20, 2013**, audit trail, collaboration, data breaches, encryption, mobile device, secure file sharing, security0 comments
Has your office been thinking about secure file sharing lately? Whether it’s because of the constant stream of news stories on data breaches, or...