Confidential Information Leaks and Your Employees20230805075104
Confidential Information Leaks and Your Employees
Tony Abou-AssalehAugust 5, 2023bring your own device, BYOD, BYOD policy, compromise, data leakage, employee, security breach0 comments
What is Information Leakage? An information leak is an event takes place when confidential information is revealed to unauthorized persons or parties....
What We Learned at the Travel Health Insurance Association Conference 201720170524221643
What We Learned at the Travel Health Insurance Association Conference 2017
Sammi PunMay 24, 2017books to read, bring your own device, BYOD, collaboration, THiA, TitanFile, Travel health insurance0 comments
The THiA Conference this year was a blast and TitanFile was happy to be a sponsor and influencer at the event. Although our favourite aspect of the co...
How to Build a Cyber Security Culture at Your Firm20170524213435
How to Build a Cyber Security Culture at Your Firm
Sammi PunMay 24, 2017bring your own device, BYOD, cloud computing, Cloud security, collaboration, cyber security, cybersecurity, data breaches, data leak, data loss, ebook, email, encryption, file sharing, information security, secure file sharing, security, security breach, small medium business, SMB0 comments
Implementing a working culture of cyber security is difficult. Compliance is complex and rolling out a complete system and nailing out all the details...
Ignorance is not bliss: Why you need a BYOD policy20130718112438
Ignorance is not bliss: Why you need a BYOD policy
Tony Abou-AssalehJuly 18, 2013bring your own device, BYOD, cybersecurity, data leak, security breach2 comments
Given the frequency with which it’s mentioned in the news, it’s not surprising that the practice of Bring Your Own Device (BYOD) doesn’t seem to be go...
How Do You Communicate with Management About Cybersecurity?20130716131108
How Do You Communicate with Management About Cybersecurity?
Tony Abou-AssalehJuly 16, 2013bring your own device, BYOD, Cloud security, collaboration, communication, cyber security, cybersecurity, data leak, file sharing, IT, jargon, online collaboration, online security, Quartz, secure file sharing, security, security breach0 comments
Quartz shared a study this week on a pressing issue in the cybersecurity space – the inability of IT employees to communicate effectively with managem...
How to Develop an Online Security Policy20130715090805
How to Develop an Online Security Policy
Tony Abou-AssalehJuly 15, 2013bring your own device, BYOD, ebook, online security, security policy, small medium business, SMB0 comments
Before we dig in too deep, let’s start this blog post off with two questions: 1. Does your organization include staff members that access the Internet...
7 Things to Include in your BYOD Policy20130403123419
7 Things to Include in your BYOD Policy
Tony Abou-AssalehApril 3, 2013bring your own device, BYOD, mobile devices, online security, security policy0 comments
Yesterday we shared a post on whether or not Bring Your Own Device (BYOD) policies are required in the workplace. While BYOD may be a hotly debated to...
Does my Organization need a BYOD Policy?20130402151728
Does my Organization need a BYOD Policy?
Tony Abou-AssalehApril 2, 2013bring your own device, BYOD, Cloud security, mobile security0 comments
Bring your own device (BYOD) continues to be a topic that generates much discussion in the security space. Discussions on mobile security, BYOD and th...
How to Successfully Manage BYOD Security20130321105650
How to Successfully Manage BYOD Security
Tony Abou-AssalehMarch 21, 2013bring your own device, BYOD, Cloud security, computer world, mobile device0 comments
We’ve talked about Bring Your own Device (BYOD) on the blog before, and it’s still a topic that’s generating a lot of conversation. If managed success...