7 Things to Include in your BYOD Policy20130403123419

7 Things to Include in your BYOD Policy

April 3, 2013
Yesterday we shared a post on whether or not Bring Your Own Device (BYOD) policies are required in the workplace. While ...
Does my Organization need a BYOD Policy?20130402151728

Does my Organization need a BYOD Policy?

April 2, 2013
Bring your own device (BYOD) continues to be a topic that generates much discussion in the security space. Discussions o...
What is the Difference Between HTTP and HTTPS?20130322103657

What is the Difference Between HTTP and HTTPS?

March 22, 2013
Before jumping into HTTPS, let’s first discuss what the acronym HTTP stands for. HTTP, HyperText Transfer Protocol, is a...
How to Successfully Manage BYOD Security20130321105650

How to Successfully Manage BYOD Security

March 21, 2013
We’ve talked about Bring Your own Device (BYOD) on the blog before, and it’s still a topic that’s generating a lot of co...
Why Collaboration is Important for Your Business20130318102426

Why Collaboration is Important for Your Business

March 18, 2013
Many hands make light work. Teamwork divides the task and multiplies the success. In business, there’s a lot of talk abo...
Protecting Your Company After an Employee Leaves20130315131127

Protecting Your Company After an Employee Leaves

March 15, 2013
When an employee leaves a company, especially on bad terms, there’s always a risk that they could try to negativel...
How Private are Work Email Accounts?20130311121525

How Private are Work Email Accounts?

March 11, 2013
Harvard University has recently come under fire for hacking into the email accounts of 16 resident deans last fall in an...
Is HIPAA Protecting your Privacy?20130301082312

Is HIPAA Protecting your Privacy?

March 1, 2013
Signed by President Bill Clinton, the Health Insurance Portability and Accountability Act [HIPAA] of 1996 was enacted to...
What if your Security is Breached? 3 Lessons Learned20130228123319

What if your Security is Breached? 3 Lessons Learned

February 28, 2013
You had backups to your backups, plans in place, and security that you had faith in. But it still happened. Your systems...