Confidential Information Leaks and Your Employees20230805075104

Confidential Information Leaks and Your Employees

What is Information Leakage? An information leak is an event takes place when confidential information is revealed to unauthorized persons or parties....
What We Learned at the Travel Health Insurance Association Conference 201720170524221643

What We Learned at the Travel Health Insurance Association Conference 2017

The THiA Conference this year was a blast and TitanFile was happy to be a sponsor and influencer at the event. Although our favourite aspect of the co...
How to Build a Cyber Security Culture at Your Firm20170524213435

How to Build a Cyber Security Culture at Your Firm

Implementing a working culture of cyber security is difficult. Compliance is complex and rolling out a complete system and nailing out all the details...
Ignorance is not bliss: Why you need a BYOD policy20130718112438

Ignorance is not bliss: Why you need a BYOD policy

Given the frequency with which it’s mentioned in the news, it’s not surprising that the practice of Bring Your Own Device (BYOD) doesn’t seem to be go...
How Do You Communicate with Management About Cybersecurity?20130716131108

How Do You Communicate with Management About Cybersecurity?

Quartz shared a study this week on a pressing issue in the cybersecurity space – the inability of IT employees to communicate effectively with managem...
How to Develop an Online Security Policy20130715090805

How to Develop an Online Security Policy

Before we dig in too deep, let’s start this blog post off with two questions: 1. Does your organization include staff members that access the Internet...
7 Things to Include in your BYOD Policy20130403123419

7 Things to Include in your BYOD Policy

Yesterday we shared a post on whether or not Bring Your Own Device (BYOD) policies are required in the workplace. While BYOD may be a hotly debated to...
Does my Organization need a BYOD Policy?20130402151728

Does my Organization need a BYOD Policy?

Bring your own device (BYOD) continues to be a topic that generates much discussion in the security space. Discussions on mobile security, BYOD and th...
How to Successfully Manage BYOD Security20130321105650

How to Successfully Manage BYOD Security

We’ve talked about Bring Your own Device (BYOD) on the blog before, and it’s still a topic that’s generating a lot of conversation. If managed success...