Blog

  • Is Shadow IT Finally Coming Out Of The Shadows?

    When you receive an email or document in your office email, do you ever forward it to one of your personal email addresses? If so, you may have done it because your company only gives you a small amount of storage space for your emails. Maybe you forwarded it to your personal email account because […]

  • Expect Even More Security Threats With Internet of Things

    According to a recent article from CIO, the now infamous Target data breach that exposed the personal information of millions of customers was caused when a contractor who worked on the company’s heating and air conditioning gained access to the information via its online system. With the coming of the Internet of Things — the […]

  • Good IT Security Means Getting the Details Right

    The scale of information and expertise a CIO or IT department manager needs on the job is truly enormous. Many individuals who don’t work in these roles would be daunted by the scale of what’s required. While many good IT professionals relish the challenges of providing IT Services in their organizations and love the diversity of […]

  • Protect against ‘Backoff’ and other malware

    The past year has been notoriously bad for data breaches. This week the New York Times reported that a Russian crime ring obtained 1.2 billion user name and password combinations from 420,000 websites. At the end of last year Target and other large businesses discovered malware on their point of sale systems that was capturing […]

  • Shadow IT: Risky Business  

    Shadows come in many different shapes and forms, but not all of them are friendly. A shadow IT is one of the not-so-friendly variety. It describes the use of IT services or systems that do not have corporate approval … yet. Can You Say … It happened here at my business. An end user with an approaching deadline acts […]

  • Why You Should Hire an IT Security Team

    Your business is booming. Thousands of users have signed up for your website. You login to your email client so you can check the amount of money that you’ve made yesterday. Instead of being greeted with a summary of the amount of sales your business has made, you notice tons of emails from your customers. […]

  • How Your Trusted Employees Can Compromise Your Corporate IT Security

    As businesses continue to monitor External Corporate IT Security Threats, it is just as important to develop sound strategies for protecting against intentional and unintentional security breaches from within the organization. Often times, the employees who are trusted the most are the ones who either maliciously or without intent, compromise the security of the vital IT […]