DATA LOSS PREVENTION PART 3


  In this final piece about Data Loss Prevention, we examine some important characteristics of DLP Software Packages, and some of the leading ones that you should consider acquiring for your business or corporation.   DLP software packages come in three main categories:   Network based solutions These are typically installed at the endpoints of […]

Read More…


5 APPS FOR IMPROVING YOUR PHONE’S DATA SECURITY


  Ascend Education recently released part three of its series on the top smartphone security threats today. The article tackles cyber threats like screen lockers and ransomware. Considering that the topic is already in its third edition, it’s clear that our data can be compromised in creative and unexpected ways via our phones. It’s important […]

Read More…


DATA LOSS PREVENTION PART 2


  Our last post examined the important concepts of what Data Loss Prevention (DLP) is.  In this post, we now examine the required controls that are needed to safeguard these datasets, as well as the important features you need to look out for as you pick a particular DLP solution for your business.   The […]

Read More…


AVOIDING CARD SKIMMERS AT THE PUMP


  Many of us have heard of fuel dispensers being a target for card-skimming devices.  Brian Krebs wrote a post on his blog “Krebs on Security” on how to avoid these card skimmers, and he uses the San Antonio Police Department as a source for tips. Some of these tips include using only new fuel […]

Read More…


DATA LOSS PREVENTION PART 1


  To any business or corporation, information and data are the blood flow of daily operations.  This consists of market intelligence as it relates to your competition, the sensitive customer information (such as contact info, credit card/banking numbers, etc.) and even your own internal data.  Safeguarding all of this data is a must, not only […]

Read More…


BE AWARE OF MALWARE


  Cybersecurity is a growing field in this developing technology era; it is something that any organization has to pay attention to because of the many cyber threats present in today’s society. Read the following blog post written by Chris Brook for Digital Guardian about potential, and very destructive, malware threats.     Being aware of […]

Read More…


5 Tips to Avoiding Ransomware


A recent blog post reviewed what Ransomware is, how it is deployed, and the types of attacks that can occur.  Essentially, it is a type of cyber-attack that can lock up your computer screen, your mission critical files, and the data that your company depends on daily.   The only way you can ever hope […]

Read More…


Breaking Down What Incident Response Means for Your Business


The Need for An Incident Response Plan   In today’s world, Cyber-attacks are becoming the norm – no business or corporation is immune to them.  It seems that no matter what an entity does to fortify its defense perimeters, the hacker will find a way to circumvent it and inflict as much damage as possible.  […]

Read More…


Business Cybersecurity: Take a Lesson From Custer’s Last Stand


On June 25, 1876, Lt. Col. George Armstrong Custer started into a conflict he was vastly under-prepared for. That conflict would cost him his life, and half the lives of the entire 7th Cavalry.   Custer was fighting in the Great Sioux War with admirable success before the infamous battle. In the days leading up […]

Read More…