Sign up | Login with →

Security

Blockchain disrupting many industries

April 12, 2016 by Sandeep Raut

Until recently, Blockchain was a term only known to geeks and specialists. But in the last six months it has become a buzzword.In very simple terms Blockchain is the act of recording events in a database. The database itself is referred to as the Blockchain. Once data is added to the Blockchain, it cannot be removed from the database or...[read more]

exclusive

5 Ways Local Governments Can Benefit By Embracing The Cloud

April 8, 2016 by Elianna Hyde
1

Many people look at the way their local government operates and think that they are still working like it is the stone age. They see governments working with massive amounts of paperwork. They look at the amount of time that it takes to get information or to get anything done that involves the local government. It leaves people to wonder if there is anything that can be done to improve the way the local government operates.[read more]

The Panama Papers- It’s all about the data!

April 8, 2016 by Jagadish Thaker

The Panama Papers has set an excellent example for the world about the importance of data science when it comes to analyzing big data. This leak makes us realize that appropriate approaches are needed to handle the challenges of data management for the present and the future.[read more]

Disrupting Nation State Hackers With the Security Basics

April 6, 2016 by Thu Pham

Earlier this year at the USENIX Enigma information security conference held in San Francisco, NSA’s Rob Joyce gave a talk, Disrupting Nation State Hackers on how to keep people like him (nation state and other types of hackers) out of their systems.[read more]

Cloud Security: A Key to Cloud Computing’s Growth

March 28, 2016 by Sean Shado Shado

Gone are the days where IT professionals are asking: “what exactly is cloud computing?” It’s 2016 – everyone has some form of understanding of the cloud. This can be seen in the data itself - nine out of ten organizations use the cloud in one way or another, with data centers, servers, and disaster recovery being the most used cloud...[read more]

Business Continuity RPO and RTO: Why Should I Care?

March 22, 2016 by Kyle Cebull

Disaster recovery is pretty important, right? You need to be able to work at some point if your network goes down because of a major disaster, whether it’s a natural disaster or a result of some sort of network invasion or massive failure. While there are a lot of acronyms in the technology management industry, when it comes to disaster...[read more]

Tactics to Protect Against Most Common Cyber Attacks

February 19, 2016 by Peter Davidson

Cybercrimes in today’s technologically advanced society have become much more sophisticated and progressive. We can thank mobility for the ease of extended access to our personal data, as with every use of our mobile phones, laptops or tablets in public areas we further increase our risk and vulnerability.[read more]

exclusive

Cloud Data Security can’t be overlooked in 2016

February 11, 2016 by Sean Mallon

The number of cloud users – both corporate and personal – increases dramatically each year. And as these numbers grow, so do the security threats. Cybercriminals realize that many of these cloud providers aren’t as safe as believed and will target this vulnerable data. As a business owner or IT professional, you need to take a long look at security before trusting your data to the cloud.[read more]

exclusive

Dealing With Careless Users as a CIO

February 9, 2016 by Xander Schofield

The majority of Chief Information Officers (CIOs) are generally very well versed when it comes to the various facets of securing organization networks, sensitive data encryption and on how to secure private customer information. While as a CIO, you may be on top of your game, there is a possibility of the existence of a glaring security flaws which you could have overlooked or ignored: your organization’s end-users.[read more]

4 Ways to Increase the Security of Wearable Devices

January 21, 2016 by Kyle Cebull

iStock_000077380897_Small As the Apple Watch and other Smart Watches gain momentum, we’ve seen increasing adoption in the business world. These wearable devices have done a lot for the productivity of employees. But a concern that must be raised is what security gaps exist in these devices? Hackers are always looking for ways to infiltrate company networks and data, and wearables are just one more opportunity for them to find a hole or weakness. Without a doubt, because of their access into e-mail, there are certain precautions that must be taken to ensure that company information cannot be compromised. Here are a few ways to increase the security of wearable devices.[read more]

Flash Vulnerabilities & Exploits: An Information Security Primer

January 12, 2016 by Thu Pham

Adobe Flash Player is used to create and play animations, video games, advertisements and mobile apps - it’s considered a software necessity by many users and is used daily. But to criminal and malicious hackers, it’s also easy to exploit, due to many known vulnerabilities in old Flash versions.[read more]

exclusive

Could Cloud Based Systems Save the World?

December 14, 2015 by Josh Rose

Big data needs big resources. Big resources have big costs - and not just financially. As technologies improve and the Earth spins faster we find ourselves using and needing more resources for the ever growing amounts of data that have now become ingrained into the everyday functioning of our lives.[read more]

exclusive

How to Overcome BYOD Security Challenges

December 9, 2015 by Ryan Kh

Bring your own device is one of the fantastic ways businesses can cut costs at no real impact to their employees. However, there are challenges, specifically ones related to security. We’ve compiled a list of them and also how to overcome the most common and harmful ones.[read more]

exclusive

Control Business Costs with Workforce Analytics

November 16, 2015 by Sarah Smith

When something goes wrong in a company, the availability of analytics data should motivate employers to resolve quickly worker claims and take steps to address problems identified or predicted by their software.[read more]

exclusive

Working With Your IT Department to Improve Corporate Efficiency

November 13, 2015 by David Schwartz

For a while now, companies have been re-evaluating their commitment to onsite IT because there are other options available that can help them make their business teams more cost effective. Here are 5 ways that IT departments are helping companies improved corporate efficiency.[read more]