Tech Insights

rss

Contributor Columns on Information Technology and Security

Your user base is the single most important resource that you have, which should be sufficient to incentivize you to ensure that they are being catered to. The increased commoditization of IT resources has created an environment that allows businesses to become more agile when it comes to ensuring ...

The Bring Your Own Device (BYOD) movement has in some ways saved companies money, but in other ways put customer data at risk. Employees are onsite, telecommuting or traveling on business. This means their devices, and company data could be anywhere at any given moment. A company manager or owner ...

There’s a problem on the home front: security lapses in the computers of the Secret Service and Immigration and Customs Enforcement, says a report on townhall.com. These departments were recently audited, and weaknesses were revealed. Recently, hackers got into the White House, State Department and the Office of Personnel Management, ...

Editor’s Note: In this week’s guest blog security expert Robert Siciliano explains how to protect your IT systems and your business from hardware failure. To learn more, download our new e-book, “5 Things Small Businesses Need to Know about Disaster Recovery.” It is September and that means National Preparedness Month: an ...

Public cloud spending worldwide could reach $70 billion this year. This is among the key predictions made in a new report titled “Cloud Computing: The Essential Foundation of Industry Digital Transformation — Worldwide and U.S. Cloud Forecast by Vertical, 2015–2019” that was released by IDC recently. The study analyzes ...

Are you considering moving aspects of your business into the cloud?   Change is scary for many people—and so too it goes in the business world. While the statistics prove businesses are continuing to migrate to the cloud, not all are doing so without trepidation. While any decision that will transform ...

A hybrid cloud is an integration of at least one private cloud and at least one public cloud, creating a cloud computing environment wherein some resources are supplied externally while others are provided and managed in-house. Putting everything on a public cloud has advantages, but it is not always ...

These days, it is hard to pick up a newspaper or go online and not see a story about a recent data breach. No other example highlights the severity of these types of hacks than the Sony breach late last year. While a lot of information, including creative materials, financials ...

Perhaps you’ve read that “HTTPS” at the start of a website address means that the site is secure, encrypted. However, a feature of the HTTPS can track you, says an article at theregister.co.uk. HTTP is not secure. Carnegie Mellon University in a Register article states “HSTS”, which is “Strict Transport ...

IT people need to beef up their opinions about cloud security, says a recent report by the Ponemon Institute called “Data Breach: The Cloud Multiplier Effect.” Yes, data breaches occur in the cloud. In fact, it can be triple the cost of a data breach involving a brick and mortar ...

The Number One Menace to All Organizations
 

Learn more about how to protect your organization against this growing menace
https://info.knowbe4.com/ransomware-simulator-tool-its