The following is a data protection guest post article from Manmohan Hebbar at LockLizard PDF IT Security: Whenever a data breach takes place in an organization, it serves as a cautionary note for other enterprises. IT administrators gather information from such events...
Data Security
Special Edition: 4-Tips on Data Protection for Manufacturers
Your major competitive advantage versus other manufacturers could be a super-secret proprietary process. Maybe you have customer service methods that are so efficient and pleasing to your customers that you don’t want anyone else finding out. And of course, you don’t...
Data Security Challenges Law Firms Face with Younger Attorneys
[vc_row][vc_column][vc_column_text] Not long ago I wrote an article for this blog entitled "Why Law Firms Need an IT Policy for Data Security" and it discussed young employees' (specifically, millenials) computer behavior and how it is impacting Law Firm IT Support...
Does Free Antivirus Software Do the Job?
[vc_row][vc_column][vc_column_text] When you run a small business, you spend money on the bare essentials – and that’s it. Sometimes, that means cutting some corners. Others, it’s hard to tell what really is essential to running your business. So does antivirus fall...
Heartbleed Bug Still Able To Compromise Data Security on 300K Servers
[vc_row][vc_column][vc_column_text] Like a flash in the pan, the Heartbleed Bug has faded away from mainstream news to only be whispered by those data security experts assigned to address server security issues for companies. With the lack of any current information...
760 Data Security Reasons to Switch to a New Operating System
[vc_row][vc_column][vc_column_text] According to TechTarget's recently posted article "6 Benefits of Migrating to Modern OS's," The Dell SecureWorks Counter Threat Unit (CTU) has catalogued more than 760 vulnerabilities in Windows XP, and predicts “continued discovery...
5 Data Protection Questions (And Answers)
[vc_row][vc_column][vc_column_text] What do you know about data protection? Even if you’re just a newbie, that’s okay. Today, we’re going to cover a few common questions small business owners often ask. Here they are in random order: 1. What makes data security so...
How Secure is that Coffee Shop Connection? A Data Security Discussion
[vc_row][vc_column][vc_column_text] We have all done it. Some time between meetings, stop at Starbucks and get some work done. Check email while you are waiting for your flight at the airport. Or even shelling out the $30 to connect on the plane during that cross...
Mobile Data Security: Forget BYOD – Now the Buzz is BYOx!
[vc_row][vc_column][vc_column_text] We have been discussing BYOD (Bring Your Own Device) for a while now and its impact to your company's data security plans. BYOD is employee-owned devices being brought into a business. Smartphones, tablets, laptops and USB drives...
Top 5 Viruses and How They Have Impacted Data Security
[vc_row][vc_column][vc_column_text] You know what the most amazing part about Heartbleed is? It was around for two years before any news came out about. And it also affected about 2/3 of all internet servers. Doesn’t it seem amazing something like this could happen in...