Encryption

BYOT: Bring Your Own Technology

BYOT: Bring Your Own Technology

There’s an interesting article in the October issue of the Economist that spotlights the challenges that large enterprise has to manage the use of technology in their workforce. It paints an interesting – albeit somewhat disturbing — picture of the state of technology at work today. The days of corporate-wide devices and programs are disappearing … Continued

Data Backup – How Good is YOURS? Questions About Online Backup

Data Backup – How Good is YOURS? Questions About Online Backup

90% of businesses will experience a data loss within their first 5 years. Ouch. That’s called the school of hard-knocks. New businesses are so singularly focused on growth, that sometimes they overlook the insurance they need to maintain it in the event of a disaster. A significant data loss can derail any business, especially one … Continued

Hacking Threat and Data Protection

If you’re thinking, “No one would want my company information, we’re never going to be a target of a hacker,” you’ll need to get your head examined and prepare for the worst. Hackers are attacking everyone from the little mommy bloggers to the US Government’s top information technology provider. It’s no longer about IF you … Continued

9 Things to Ask About Online Data Storage

Everyday people are becoming more and more digital from photos, scanned documents for paperless offices and computer files, our appetite for electronic mediums is growing by leaps and bounds. And with that growth is an ever growing importance protecting that information. Businesses can be destroyed by natural disaster if an appropriate means of backing up … Continued

How Do You Define and Manage Access Controls?

Access control permits or denies a user access to information, systems or resources. It allows an organization to effectively manage, track and audit disclosure of information. What are the primary objectives of access controls? Access control maintains and safeguards confidentiality, integrity and availability of information, systems and resources: