Personal Data Protection: Identity Theft Is on the Rise
In 2015, varying with the type of identity theft, identity thieves harmed eighteen million people only in the USA. That’s…
Data Security – Why Your Investments May Not Be Enough
The 2015 hacking of the IRS database that gave criminals access to details of more than 700,000 tax payers in…
5 steps to protect your business data in a mobile world
The rise of mobile presents many advantages to the modern business. As mentioned in this article, mobility can improve customer service,…
Cybercrime: could tokenization and blockchain help end data theft?
For a while now, America has been a hotbed of credit card fraud and data hacks. In terms of credit…
Defining SQL Server Security Roles for Better Security Management
SQL Server comes with a long list of database, application and server roles which outline data selection and modification, disk…
The Marriage of Ransomware and DDoS
A new version of ransomware has been detected recently that not just holds the data hostage and the victim’s machine…
4 HUGE Misconceptions About Business IT Security
When it comes to IT security, many business owners think that hackers are only targeting large businesses. We see things…
Top 5 criteria to consider in a data protection provider
Your organization’s data is money unaccounted for on the balance sheet, and it must be protected. A secure production site with no…