How to Create a Security Culture in Your Organization20240614141628
How to Create a Security Culture in Your Organization
Joakim RodriguesJune 14, 2024cloud computing, Cloud security, collaboration, cyber security, cybersecurity, data breaches, data loss, encryption, file sharing, information security, secure file sharing, security, security breach, small medium business, SMB0 comments
Implementing a working culture of cyber security is difficult. A strong cybersecurity culture requires organizations to meet security and compliance r...
15 Important Cybersecurity Statistics in 202120210206151253
15 Important Cybersecurity Statistics in 2021
Renzo DelvecchioFebruary 6, 2021cyber attacks, cyber-crime, cybersecurity, data breaches, security breaches0 comments
COVID-19 1. Cybercrime is up 600% due to the COVID-19 pandemic (PurpleSec) Many cybercriminals are now posing as the Center for Disease Control and Pr...
10 Cybersecurity Statistics in 2019 [Infographic]20191105121735
10 Cybersecurity Statistics in 2019 [Infographic]
Renzo DelvecchioNovember 5, 2019cyber attacks, cyber-crime, cybersecurity, data breaches, security breaches0 comments
Cybersecurity is easy to procrastinate when you don’t quite understand what’s happening around the world. Luckily for you, you’ve st...
How to Build a Cyber Security Culture at Your Firm20170524213435
How to Build a Cyber Security Culture at Your Firm
Sammi PunMay 24, 2017bring your own device, BYOD, cloud computing, Cloud security, collaboration, cyber security, cybersecurity, data breaches, data leak, data loss, ebook, email, encryption, file sharing, information security, secure file sharing, security, security breach, small medium business, SMB0 comments
Implementing a working culture of cyber security is difficult. Compliance is complex and rolling out a complete system and nailing out all the details...
Providing Better Client Service Through Online Collaboration20130404133017
Providing Better Client Service Through Online Collaboration
Tony Abou-AssalehApril 4, 2013business, competition, competitive advantage, customer service, data breaches, online collaboration, secure file sharing, trust0 comments
Regardless of the service or product required, consumers usually have a large pool of candidates to choose from when making a purchasing decision. At ...
Is HIPAA Protecting your Privacy?20130301082312
Is HIPAA Protecting your Privacy?
Mark DineenMarch 1, 2013**, data breaches, healthcare, HIPAA, HITECH, privacy, security, security leaks0 comments
Signed by President Bill Clinton, the Health Insurance Portability and Accountability Act [HIPAA] of 1996 was enacted to protect the privacy rights of...
How to use Security and Privacy as a Competitive Advantage20130221193442
How to use Security and Privacy as a Competitive Advantage
Tony Abou-AssalehFebruary 21, 2013**, business, competition, data breaches, privacy policy, security policy, trust0 comments
Create a selling feature that puts you ahead of your rivals. That’s business 101, right? But sometimes it can be difficult to decide exactly wha...
5 Things to Consider When Choosing a Secure File Sharing Provider20130220123828
5 Things to Consider When Choosing a Secure File Sharing Provider
Tony Abou-AssalehFebruary 20, 2013**, audit trail, collaboration, data breaches, encryption, mobile device, secure file sharing, security0 comments
Has your office been thinking about secure file sharing lately? Whether it’s because of the constant stream of news stories on data breaches, or...